Jump to content


Popular Content

Showing content with the most kudos since 08/19/2018 in all areas

  1. 4 points

    ransomware attack

    ESET didn't fail to protect the user. This is proved by the fact that ESET had recognized the ransomware for a long time before the user got infected which means that ESET must have been paused or otherwise deactivated by an attacker. Because of continual trolling despite giving numerous warnings and complaints from other users, we'll ban Novice as of now.
  2. 4 points

    ransomware attack

    This is the last warning to Novice. Further to complaints from other users that we've received about your ranting, we kindly ask you to stop this. Either give us a proof that there is an antivirus that can detect 100% of threats without updates and without any false positives and at the same time it can protect users even if they unwittingly allow an attacker to do anything on their machines under an admin account or stop trolling and ranting. We are open to serious communication but trolling is not tolerated and will never be neither here nor in any other forums. Otherwise we will need to take the appropriate action.
  3. 3 points

    AV-TEST and ESET

    I use the daily "seat of my pants" results. I know what works for me. No A/V program is 100%...that's why they get updated and evolve. In my opinion, these A-V test results (no matter who publishes them) only provide the trolls with food (in addition to being (for me) worthless data). We all know (or at least should know) that you never feed a troll. Regards, Tom
  4. 3 points

    EFS 7.0.12014.0 - MSSQL ERROR

    Hi, as marcos noted this error is logged when automatic exclusions for Microsoft SQL server are enabled. Automatic exclusions for Microsoft SQL server are using ADO API to read information from "sys.master_files" table to get list of files to exclude from scanning. The ADO API obviously loads a DLL that is not signed. As a workaround, automatic exclusions for Microsoft SQL server can be disabled.
  5. 3 points
    Actually advanced users love the ability to customize numerous settings. Common users don't need to go to the advanced setup at all since ESET products provide well-balanced protection out of the box.
  6. 2 points

    no files in qurantine

    He has asked to cancel his account here. But yes, it's not normal that a user of a trial license would request a response within 1-2 hours 24x7 that is granted to VIP customers at an extra fee. Moreover, the problems with LiveGrid authentication suggesting an invalid username/password being used was highly suspicious too.
  7. 2 points

    ESET was automatically uninstalled

    And eset has a password option if enabled. As i have pointed 100s of times and probably shouldnt anymore, the AV is only part of a security setup. Its no good using an AV with for example a no longer supported update or without all the latest patches. Until people realisle the importance of this problems like this will happen. But again as also mentioned we dont know what has happened and all we can do is suggest.
  8. 2 points

    Eset Blocking Chromecast

    I truly hope the bugfix will come soon. However you really do not need to wait for that. Do the following step by step: 01. Open Eset console | 02. Click "Setup" | 03. Click "Advanced setup" | 04. Click "Web and email" | 05. Click " Web access protection" | 06. click "Web protocols" | 07. Now you are on the right place | 08. Focus on "Ports used by HTTPS protocol" | 09. You have to see the text "443, 0-65535" in the input field. | 10. Replace the text with "443, 0-8008, 8010-65535" (of course, without quotes) (you can copy-paste) | 11. Press "OK" | 12. If Windows asks for permission, press "Yes" | 13. Close ALL instances of Chrome | 14. Reopen Chrome | 15. Connect to your Chromecast | 16. Success! After the bugfix will have been rolled out, you can reset the original text you modified.
  9. 2 points
    It's not you...we are transitioning our product release communications currently for all products but once the process is finalized, we'll resume posting.
  10. 2 points

    ECA - Can we create dynamic groups?

    Thank you for the idea. I agree, it might be beneficial. I will discuss it with relevant people.
  11. 2 points
    We have pinpointed a memory leak in the memory dumper. A fix is being reviewed and will be released through an automatic module update next week.
  12. 2 points

    ESET keeps stealing focus from Firefox

    Thank you for reporting the issue and the video you've provided. We have eventually pinpointed the issue and a fix will be included in the next version of v12 products.
  13. 2 points
    Description: Prevent sleep during scan. Detail: Windows can put the computer to sleep before the scan is finished. That is very annoying. There should be an option to prevent that from happening. Oops, it's a coincidence that @zeromido asked someting similar here right above. Before I started typing, I first searched the forum for "scan prevent sleep".
  14. 2 points
    Another nice feature for the firewall component that would help a lot with maintaining the firewall rules: Description: Firewall rules cleanup of unnecessary / invalid entries Detail: I've set my firewall filter setting to interactive mode, meaning that I can define for every program what the firewall should do. Over the time, you have entries in the firewall rule set about programs that are not existing on the computer anymore. A button for an automatic cleanup of those rules (delete all firewall rules that are pointing to applications that don't exist on the computer anymore) would make it easier to keep the firewall rule list tidy and it also benefits the administration of the rule set.
  15. 1 point

    Server Not Found

    First of all, try uninstalling ESET and installing it from scratch, e.g. in case proxy or update settings were altered. If that doesn't help, continue as follows: - enable advanced logging under Help and support -> Details for customer care - run update manually - stop logging - collect logs with ESET Log Collector and submit the generated archive.
  16. 1 point
    You can download the standalone mac endpoint installer at eset.com (download section). Specifically here: https://www.eset.com/int/business/endpoint-antivirus-mac/download/ Installation works in the way, that when you choose a product you want to install, agent will connect to ESET Repository (cloud download server), and will download and installed the respective product. You can cache installers by a proxy server placed in between, to optimize a network traffic. With regards to the appliance upgrade, instructions are available in the documentation: https://help.eset.com/esmc_deploy_va/70/en-US/va_upgrade_migrate.html
  17. 1 point

    Eset Blocking Chromecast

    Not so easy as it sounds. Valid only if you watch only free stuff via your Chromecast. If you pay US$ 20-50 per month for online movie channels, then three weeks of black screen due to another paid product's malfunction makes you impatient relatively fast. That is the natural behavior of customers.
  18. 1 point

    Eset Blocking Chromecast

    I fully support this comment as well - same issue and if this did not exist in the previous version means, something has been missed during the testing or planning the update and must be resolved. We pay for the service and expect the product to function correctly. Responsibility altering network protocols and potentially leaving our machines vulnerable is not the way it works. Chromecast is a widely used product so I epxect this to be fixed pretty quick.
  19. 1 point
    @display3958023 The reason is simple. All in one installer is available only for Windows. Information is available in the help of ESET Remote Administrator: https://help.eset.com/era_admin/65/en-US/deployment_scenarios.html?fs_local_deployment_aio_create.html In case of a mac product, you can either generate an agent live installer script, or deploy the agent installer manually. Installation of the security software product can be then performed using a software install task. PS: I would strongly recommend to upgrade your server to ESET Security Management Center V7, which was released more than a year ago.
  20. 1 point

    Eset updates

    Modules are stored in "C:\Program Files\ESET\ESET Security\Modules" by default.
  21. 1 point

    Remove malware completely

    I am using an used laptop,i found some malware and uninstalled them,but i am not sure that is enough.In other words,what else do i need to do?
  22. 1 point
    There is a default dynamic group Problematic computers which is defined as: That said, any machines that have a protection feature disabled will fall into this dynamic group. Then in Notifications enable this one which you can customize, if needed:
  23. 1 point

    Constant Certificate Warning

    No that's what worried me. Browser wasn't running at the time either. I've done a restart and it's stopped now. But things that go away by themselves generally reappear by themselves. It was really unsettling...
  24. 1 point

    Disable Rogue Agent+LDAP

    Hello Jirka, For the first problem, I would first apply "reset the RD sensor database" task, to validate whether the white-list is working (as once reported the data are kept, even in case the RD sensor whitelist is actually working). Alternatively, I would uninstall the RD sensor at all, if it reports too many false positives. With regards to the second problem, I would recommend to contact your customer care, as the error is generic, and does not give is exact reasoning for what might be the failure. Regards, Michal
  25. 1 point
    This is a duplicate of https://forum.eset.com/topic/20263-eset-internet-security-122230-internet-connection-problem/. Creating duplicate topics is forbidden by our forum's rules. Having said that, we'll draw it to a close.
  26. 1 point

    "New Telemetry settings" in 12.2.23

    During installation you are asked if you want to participate in Customer experience improvement program. If you later decide to not participate, you can disable it in the advanced setup. There you will also find a web link with information about what data is collected.
  27. 1 point
    We are very sorry for the delayed announcement. It is our goal to post announcements on time with the release of new product versions so that you have all information about the releases at your disposal on time. We can assure you that we're working on improvements in this field to prevent this from happening in the future.
  28. 1 point

    Eset Mobile security

    Never heard of such issue. Settings are preserved after a reboot under normal circumstances. Please contact customer care through the built-in form so that logs are submitted and a support ticket is created.
  29. 1 point

    New version ?

    It's still in Pre-Release version. Any changelog?
  30. 1 point

    The "System Cleaner" tool does nothing.

    The purpose of the tool is to correct changes made by malware after a detection has been found. The tool should not be used in day to day use to verify if Win default settings are correct. As far as not noticing changes to your desktop and the like, most of the tool's changes would be "invisible;" like changes to Win utility processes; e.g. system restore, or registry changes.
  31. 1 point

    Problem with web control

    Rules are evaluated in the order in which appear in the list. That said, instagram.com is blocked because the first rule blocks access to social networks and instagram.com falls into that category. The second allowing rule is not evaluated because the first one was already matched. If you want to allow access to Instagram and block access to other social networks, put the second rule on top.
  32. 1 point
    Mirek S.

    MDM https requirements

    Hello, Those requirements are there mainly because iOS devices as we use built-in iOS. What iOS devices accept as trusted differs per iOS version and we described _most_ restrictive rules which should work always. (There are other requirements like RSA2048+, SHA256+ etc... for iOS described elsewhere in documentation) So in the end Your certificate may work (it will definitely work for Android devices), however when Apple brings some update to their trust validation it might stop working. HTH, M.
  33. 1 point
    MartinK, you're great! Thanks for your suggestion about problems accessing the ESET repository servers. The firewall in our network provides a transparent HTTP proxy. This seemed to cause the problem. After adding HTTP exceptions in the transparent proxy for the test computers the ECA Live-Installer package starts without error. Thanks again for your support, you saved my weekend! 🙂
  34. 1 point

    Am I having too many Edge connections?

    Oh, my. This is one reason why I am always hesitant about showing my HIPS rules when asked. You should review HIPS rule creation using Eset built-in online help on the subject. 1. For the first screen shot. change the Rule name prefix from "CameRule:" to "User rule:" All user created rules should use this prefix. No need to log any events since you already know you're blocking Edge start up. Click the "Next" button. 2. As far as the second screen - Source applications, you ignored my previously posted instructions. Click on the down arrow next to where "Specific applications" is displayed and select "All applications." Click the "Next" button. 3. Your next screen displayed at this point should be Application operations. Deselect "All application operations." Select "Start new application." Click the "Next" button. 4. The next screen displayed should be "Applications." Click on the down arrow next to where "All applications" is displayed and select "Specific applications." Click on the "Add" tab. Now enter the full path name for Edge there. Warning - verify that the EDGE .exe is actually stored at that location. Remember what I posted previously is for ver. 1809. Click on the "Finish" button. 5. Click on any subsequent "OK" button shown to save your newly created HIPS rule. 6. Reopen the HIPS section and verify that your rule was created as specified. Note this is my last instruction posting to you on how to create HIPS rules.
  35. 1 point

    Introduce yourself

    Are you looking for protection for Windows or Linux? For Windows we have ESET Internet Security and ESET Smart Security Premium (which is basically EIS with disk encryption and password manager added). Both will protect you at various layers in the system as described at https://www.eset.com/int/about/technology/. You can download EIS from https://www.eset.com/int/home/internet-security/download/. For Linux we have ESET NOD32 Antivirus for Linux desktop. It can be downloaded from https://www.eset.com/int/home/antivirus-linux/.
  36. 1 point

    Microsoft Edge Chromium

    I did some testing a while back in regards to Edge and Eset B&PP. Now, it is possible things have changed since then. I set Edge to my default browser. Manually running Eset B&PP from the desktop opened Edge as a protected browser w/o issue. Whether Eset B&PP was fully functional in regards to keystroke protection and the like, I did not test for.
  37. 1 point

    Microsoft Edge Chromium

    It must work because the content is filtered before a browser receives data. You can provide instructions how you tested so that we can check if you did everything alright.
  38. 1 point
    Unfortunately I am al so not sure how it was meant. We are officially declaring maximal number of managed clients to 10000 when using MySQL database, but it is not related to number of actually connecting clients, but rather limit is amount of data. ESMC installed over MySQL might have performance issues with processing larger amount of data and rendering larger datasets. As an result rendering of specific reports (threats for example) might be much slower, but in "clean" network even much larger environments can be managed with MySQL-based ESMC installation. Persistent connections as introduced in ESMC should actually significantly reduce load of ESMC server, especially in "dormant" state when no changes are made in management console. If properly configured on recommended HW, ESMC should handle hundreds of clients per second.
  39. 1 point
    Hello @MichalJ just make an AD synchronization and get the computers from there.
  40. 1 point

    Horizon - Endpoint Antivirus

    I'm not aware of any public statement by Microsoft re. this issue. We analyzed a dump from such crash and concluded that it was caused by a VMWare driver which was also confirmed by Microsoft when we consulted it with their developers. If VMWare contacts us, we can provide them with information that data that would help them fix the issue.
  41. 1 point

    Horizon - Endpoint Antivirus

    This is a known issue with VMWare drivers which was also confirmed by Microsoft. We recommend contacting VMWare re. the issue. If necessary, we can provide more details about the issue to their programmers.
  42. 1 point

    ESET keeps stealing focus from Firefox

    UPDATE: Here's an update about the issue that I just noticed. Perhaps it may help to zero in on the problem. If ESET-IS is left open on the system taskbar, no matter where it resides in the Z-order, this problem does not occur. Only when ESET-IS is 'closed' or minimized to the system tray (i.e. ESET-IS is running in the background, parked in the system tray) does the hijacking focus problem occur.
  43. 1 point

    Version 1.0.0


    Diagnostic.Agent.7.1_91.0_x64.zip This file should be downloaded and used only if instructed so by customer care staff.
  44. 1 point

    Forum Feedback

    A nice addition to the Forum...hopefully folks will take the time to read it.
  45. 1 point
    False positive reports To submit a possible False Positive see Submit a suspicious website / potential false positive / potential miscategorization by Parental control to ESET for analysis when you wish to submit via email or use Submit sample for analysis function from the program GUI of ESET product installed on your computer. Whitelisting ESET does provide a whitelisting service for software vendors by which you can submit your software to minimize the chances of false positives, e.g., when your software is being downloaded. This service is intended as preventive measure for trusted and undetected applications to minimize risk of future false positives. Whitelisting service is not a channel for removing existing detections, disputes or solving other unrelated problems. If you want to register your software for whitelisting, please follow the instructions in the KB article How do I whitelist my software with ESET? Requirement for False positive submissions When submitting false positive file(s) via email or via program GUI, it is necessary to send copy of falsely detected file(s) as well as description of the file. I will explain what information is needed and why it is important. 1) Name of the legitimate application the file belongs to. When submitting false positives you must be able to identify what is the name of application that is being falsely detected. No-name false positive reports (when information about the application name is missing) are harder/slower to examine and in many cases indicate correctly detected malware rather then false positive. Example of correctly provided information: “This file belongs to VLC media player 3.0.6.” When you provide the specific version number, it helps. Example how not to submit false positives: “I don’t know what it is and why I have it on my computer but I think it is a false positive.” If you don’t know what the file is, don’t report it as false positive. 2) Name of the application’s author, developer, vendor or website where you downloaded the software Each legitimate software have known author or there is known company who developed it. There is known source/origin where the software can be obtained and you can learn information about it. This information is needed in investigation process. Researchers need to verify whether the software is safe and they may need the full installer to evaluate the software properly. Researchers may need to investigate whether other versions of the same software were affected by false positive or not. It is important to know the source/website where you downloaded the software because some download websites provide different installers than original vendors. 3) Application's purpose Let the researchers know what the application is supposed to do, what value does it offer to you. This information is usually available on vendor’s website but there are many old applications where the website is no longer available, or software was distributed only on CD-ROM/DVD, or the software is custom/in-house developed and the description is not generally available. Examples how of application’s purpose: This is a picture viewer, video convertor, movie player, communication software, printing program, database program, web browser, accounting software, computer game, tool I use for programming, etc. Don’t hesitate to provide any additional information you deem important. You may add the specific detection name you saw when detection occurred. In case some specific circumstances are needed to reproduce the problem, tell it to the researchers how (For example it may happen that the file itself is not detected but it downloads/creates other files that trigger detection). You may submit false positives via email or directly from ESET product via Submit sample for analysis function. In order to use the function open GUI of ESET Internet Security, you will find following icon in Tools and clicking More Tools: Please select “False positive file” option and attach the file you want to submit. Please provide all necessary information (as described above) researchers need to process your false positive submission. Information you provide indeed significantly helps ESET laboratories in the identification and processing of samples. Thank you for your submission!
  46. 1 point
    Description: anti-phishing Ignore button disable optionDetail: when user open a phishing website user can ignore the warning and open the site. We need a function where we can disable "Ignore threat" button. I did't find any option under Anti-phishing protection settings. Please add it to ESMC policy's too.
  47. 1 point
    Description: Showing (or downloading) debug logs when tasks fail. Detail: Somewhat similar to my previous feature request, having the debug log generated during the task (akin to trace.log) and when it fails, there is a link to download the log file for that particular process. Rationale: It's to allow the Remote Administrator to figure out what is going on within the process without needing to go into the client's workstation.
  48. 1 point
    Hi Marcos, I suggested to ESET in the past to give us an easier way of whitelisting by allowing us to multi select folders/apps in one shot rather than having to do it one at a time but they never replied to me or implemented it in the latest NOD32. See how easy it is to add items to the exclusion with checkbox multi selection method. this is just on example of many AVs out there which allow that
  49. 1 point
    Agreed. I even thought about the programming logistics of that when I posted it, but as the forum is about suggestions, I thought what the heck, let's put it in, as it is a nice idea (IMO) Andy
  50. 1 point
    Yes--the suggestion for handling it without user notification is better. It's confusing and frustrating for users right now. The only other way to do it would be to make sure the user only gets one prompt.
  • Create New...