Jump to content

Leaderboard

Popular Content

Showing content with the most kudos since 09/28/2019 in all areas

  1. Hello, this option is already available in ESET Cloud Administrator console. Currently, as agents are updated via "Components upgrade task", which does not differentiate between agents, and other components of the ESMC infrastructure (server / webconsole) this option was disabled. However, in Cloud the server is fully hosted / maintained by ESET, so "one click agent updates" are possible. Please note, that for the future releases we work on "automatic agent upgrades", meaning agents would automatically upgrade themselves to the version compatible / matching with the server.
    4 points
  2. Hello guys, thank you for your feedback. We will add Bitwarden to the list of whitelisted extensions that can be loaded in the protected browser. Regards, Tomas
    3 points
  3. It's been more than 5 years I've use ESET software on my computer and ESET is the best for me. here are some reasons I still use this Boy: Inexpensive Easy-to-use interface Good malware protection Secure browser for online payments Fast scans Lots of useful extra features Small system-performance impact File encryption, hardened browser extension, webcam protection What else do you need for your security? for me having a VPN access is the one but it's not a big problem. I very much appreciate your support ESET.
    3 points
  4. I think this is resolved in just-released ESMC 7.2 where it look like this:
    3 points
  5. Description: Color code failing tasks Detail: The server used to color code the tasks that are failing. I'm running the latest ESMC, and now, that doesn't happen, and I have a hard time figuring out which tasks are failing. Is there a way to color code it again, or where can I see it? All I get is a generic email saying: "At least one client task has invalid configuration and therefore will fail."
    3 points
  6. The ESET Knowledgebase YouTube Channel celebrates its 10-year anniversary today! https://www.youtube.com/user/ESETKnowledgebase/community Check out the infographic for our lifetime YouTube statistics for the channel. The ESET Knowledgebase channel includes step-by-step video tutorials demonstrating the key processes and features of our ESET products, from ESET NOD32 Antivirus and ESET Internet Security to business products like ESET Security Management Center. In addition, our channel is yet another way for our customers to reach us with feedback and questions. We make e
    3 points
  7. False positive reports To submit a possible False Positive see Submit a suspicious website / potential false positive / potential miscategorization by Parental control to ESET for analysis when you wish to submit via email or use Submit sample for analysis function from the program GUI of ESET product installed on your computer. Whitelisting ESET does provide a whitelisting service for software vendors by which you can submit your software to minimize the chances of false positives, e.g., when your software is being downloaded. This service is intended as preventive measure for t
    3 points
  8. I've tried many AVs and kept moving in the past unhappy with them but once I switched to eset I've never looked back. Doesn't hog the system, good detection and good support
    2 points
  9. The latest ESET's products (v13.2 and Endpoint 7.3) are compatible with Windows 10 21H1. There should be no difference in performance after upgrade to Windows 10 21H1.
    2 points
  10. Marcos

    Deleting Ransomware Notes

    Making the ransomware note undetected was already considered and pros substantially outweighted cons.
    2 points
  11. The product in question is correctly classified as PUA since they don't adhere to good practices.
    2 points
  12. Kvako

    ESMC MSP API Problem

    Hi, You're almost there, just need to put a single word Bearer in front of the access token (separated by a space) When using swagger - after you receive an access token, you can Authorize by clicking Authorize button on the top with Bearer {{----token----}} written into text field Using API directly, your call should look like this curl -X GET "https://mspapi.eset.com/api/User/Current" -H "accept: application/json" -H "Authorization: Bearer eyJgbGciOiJSUzI1NiIsImtpZCI6ImU1WTdkMGJEUGtORmFDV094VWlBaUU5MDBDbyIsInR5cCI6IkpXVCIsIng1dCI6ImU1WTdkMGJEUGtORmFDV094VWlBaUU5MDBDbyJ9.e
    2 points
  13. Duplicate topic, we'll draw it to a close. The discussion can continue in the original topic.
    2 points
  14. itman

    License issue

    You need to contact whomever you purchased the license from to straighten this out.
    2 points
  15. It's most likely Filecoder.STOP. Unfortunately this family of ransomware cannot be decrypted. Do you have C:\Users shared? Most likely the ransomware running on another machine in the network encrypted files in that share.
    2 points
  16. mmm999

    Mac OS 11 Big Sur

    A lot of people coming here to this thread - just to see posts about version for big sur. We are waiting
    2 points
  17. Please remove already blue micro-hints from EES. Very annoying. There is no option to disable them. Leave them for home users.
    2 points
  18. Thanks for letting us know. First part is considered as an issue and should be targeted. Second part will be discussed as an possible improvements, which seems to be legit.
    2 points
  19. Besides edf.eset.com, it's also important that clients can connect to pki.eset.com as well to perform activation.
    2 points
  20. Hello @Zen11t, thank you very much for your explanation again. It helps us to understand your needs better. I hope this trick will help you You can filter the computers with an outdated version of agents and then click on any item in the table and select "In computer page (all)". It will navigate you to the computers section, where you will have only computers with outdated agents, and here you can also check the last connection status.
    2 points
  21. The initial scan run after installation scans all files on local disks and cleans detected files. While malware, adware and riskware is cleaned automatically, potentially unwanted and unsafe applications require the user to select an action at the end of the scan. We've run a test and files were cleaned and quarantined alright. Please collect logs with ESET Log Collector and upload the generated archive here for perusal.
    2 points
  22. Rendekovic

    EFDE Monitoring

    Hi @Mr.Gains you are right, reports are in the works currently. we are panning to offer reporting (more or less) in this scope: Computers not eligible for encryption Computers eligible for encryption EFDE not installed Computers eligible for encryption. EFDE installed AND disk not encrypted Computers with encryption in progress Computers encrypted Computers encrypted using TPM chip Computers encrypted using OPAL 2.0 Computers encrypted via FileVault2 (future) Computers with boot disk only encrypted Computers with all disks
    2 points
  23. Just remember that technical support requests need to be directed to one of those counties; i.e. country of purchase. Assumed is the language to be used would be Arabic. However, 70% of Turkey's residents speak Turkish.
    2 points
  24. Sanctions U.S.: https://www.state.gov/iran-sanctions/ U.K.: https://www.gov.uk/guidance/sanctions-on-iran EU and UN sanctions: https://www.consilium.europa.eu/en/policies/sanctions/iran/ Slovakia where Eset is headquartered is both an EU and UN member.
    2 points
  25. William Zujkowski

    Mac OS 11 Big Sur

    Hello @Peter Randziak, Thank you for following up! Sounds good, I will bump this again in a month or so to check on it's status and hopefully remind you. William
    2 points
  26. Marcos

    RanSim test

    It would be easy if ransomware actually worked like the simulator but since there are numerous ways how to encrypt files, actual malware usually works differently. Moreover, the simulator won't encrypt your own files plus it's relatively already widespread which are another factors that substantially affect detection.
    2 points
  27. Actually aggressive vs balanced settings affect only detection, not scanning and currently affect mainly Augur detection only. We plan to make further optimizations to reduce scan times.
    2 points
  28. I am 100% there with you, I am now disappointed that you make the effort to test the software, report the errors found to the German support and all reported errors in the final, or so-called final, in my eyes nothing more than a very bad beta version is to find again + to find the errors of the previous build again, if this continues with Eset, I will also consider whether I should pay for it and that although I am an absolute Eset I'm a fan and have been using it since NOD v2, I am really very disappointed!
    2 points
  29. Marcos

    ESMC Auto Upgrade

    ESMC is a complex mission-critical product and it's important for administrators that it runs reliably all the time. Upgrade should be performed after backing up the database and at the time when administrators can afford to solve possible issues should something go haywire during upgrade. Likewise administrators do not let server systems upgrade automatically and immediately after the OS maker releases updates not addressing critical vulnerabilities.
    2 points
  30. Do you have libappindicator1 installed?
    2 points
  31. Since you are in the official ESET forum, the answer is clear Anyways, it's a good practice also to try various products to find out if a particular AV works alright on your machine. It can happen that an AV with excellent results in tests causes performance issues in your environment and vice-versa. Should you encounter an issue while trialing ESET, you can ask here for assistance.
    2 points
  32. Hi, a quick update to this older thread. With the upcoming update of the Archive support module (v1303, currently on pre-release servers) it should be now possible to remove macros from office documents in incoming emails, even in previously released Mail security products. If you define a custom rule with Attachment type condition, select "Office files/Generic OLE2 Compound Document", and choose Quarantine attachment (or Delete attachment) as an action, Office documents will be delivered without any macros. Note: you can of course combine additional conditions in the rule
    2 points
  33. Mitchell

    Microsoft Teams issues

    Seems that creating the following rule is sufficient: Name: Allow Teams Helper App: /Applications/Microsoft Teams.app/Contents/Frameworks/Microsoft Teams Helper.app Action: Allow Direction: In Protocol: TCP & UDP Ports: Remote Remote Port: All Destination: Entire internet
    2 points
  34. Marcos

    Microsoft Teams issues

    Does creating a permissive bi-directional firewall rule for the following app help? /Applications/Microsoft Teams.app/Contents/Frameworks/Microsoft Teams Helper.app
    2 points
  35. Have full control over devices connected to the account, like remote updates, remote settings, remote scanning etc.
    2 points
  36. Description: Products updateDetail: Verify if the installed products are up to date
    2 points
  37. Hi Team, Description: Example REST API usage with Perl / Python Detail: An example document on how to use the API with Perl would be helpful you have one using C however I would just like to create a few script based calls to it using Perl for use with Nagios and other systems I have to integrate further with our other tools. Description: Failure Details inside Web Interface, Detail: Most of the time when a task fails it provides hardly any details why I need to follow the rabbit hole to the trace log, Description: Slackware Linux Support /+ Native
    2 points
  38. M.K.

    Eset Mail Security

    Hi, also please note that ESET Mail Security for Exchange can also be used to scan Exchange Online mailboxes with on-demand scan in case of hybrid deployments (on-premise + cloud). Mail transport in hybrid deployments is scanned only if emails are routed first to on-premise server and then to cloud. Matej
    1 point
  39. Why would I pay extra when I have an easy and secure(open-sourced) option without paying extra money? Adding an extension is easier and cheaper than your recommendation! I already see some extensions are already approved by Eset.
    1 point
  40. IgorDR

    Threat removed pop up

    I had this problem this morning and here is the solution! The problem is that Nod32 is not able to delete or move the infected email, so it continously dowloads the same email via IMAP, every minute. But you don't see the email in your email client, because it is still on the server. You have 2 solutions: Use the web interface of your email provider and delete the email directly on the server. If your email provider does not offer you a web interface, disable the antivirus, let the infected email to be dowloaded to your client, delete it and restore the antivirus.
    1 point
  41. TLS connection is actually initiated by ODBC driver installed in system, so it is not in ESMC control. Could you please check what ODBC driver is actually used by ESMC and possibly install latest version. My best guess is that older version is used, which has no support for TLS 1.2. Also it seems that SQL Server 2014 in latest version you are using is supposed to fully support TLS 1.2: just for information, with recent versions we are installing SQL Server 2019 + all-in-one installer do even support upgrade of database server is supported by operating system, but ODBC driver is not installed n
    1 point
  42. Thank you, Marcos. This was very helpful, I was able to find an alternative torrent client. Cheers.
    1 point
  43. As this article: https://www.networkworld.com/article/3298160/how-to-protect-your-infrastructure-from-dns-cache-poisoning.html notes, DNS poisoning mitigation really applies to enterprise environments running their own DNS server. A home router does not contain a true DNS server although it may state it does. In reality all that exists is a DNS cache repository built and refreshed from your ISP or third party DNS servers. A DNS poisoning attack will be directed at those or intermediary DNS backbone servers throughout the Internet. It is almost impossible to detect a real DNS poisoning att
    1 point
  44. itman

    RanSim test

    Yikes! This is still coming up after three years. I wrote about this here: https://forum.eset.com/topic/10792-ransomware-simulators-a-detailed-analysis/ and methods employed by Ransim and why Eset ignores their tests.
    1 point
  45. itman

    WMI provider crash

    As far as WMI crashes go, no one has posted any details in regards to the crash. Again refer to this Technet posting: https://techcommunity.microsoft.com/t5/ask-the-performance-team/wmi-common-symptoms-and-errors/ba-p/375483 . Then cross reference error codes in the article to those shown in the technical details for the associated Reliability log event. If this new Eset version was the absolute source for these WMI crashes, everyone would be posting about it. It is possible Eset might be a contributing factor to these WMI crashes but only because previous issues exist in regards to
    1 point
  46. Marcos

    Manual update

    Correct. However, I don't see any good reason for not updating modules automatically.
    1 point
  47. itman

    WMI provider crash

    Periodic WMI crashes have occured before: https://support.microsoft.com/en-us/help/959493/the-wmi-provider-host-program-wmiprvse-exe-may-crash-on-a-windows-serv So I suspect an issue exists in Win 10 2004 given all its problems to date. Why this might manifest with Eset installed remains to be determined.
    1 point
  48. Description: Program/application auto update Details: the option which allows ESET to update windows applications with one click saving time and effort from updating each application individually and help in securing these programmes with their regular updates
    1 point
  49. Description: Support LDAP or RADIUS login for ESMC Administrators Detail: We'd love to see ESMC support the ability to login via LDAP or RADIUS, instead of just active directory and local users. We want to enable 2FA/MFA to protect ESMC, but trying to avoid the sprawl of apps needed on our phones, with every vendor pushing their own app for MFA. If LDAP or Radius were supported for logging into ESMC, it would open up the option for lots of other MFA services to work, like DUO.
    1 point
  50. Description: Eset sysrescue linux based. Detail: I feel that Eset should offer a linux based sysrescue as well as the windows one. some malware does not allow windows discs to boot properly and this would solve the issue. Linux based rescue discs can offer wireless updating as well as Ethernet which would be good for laptops.
    1 point
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
×
×
  • Create New...