Marcos

Administrators
  • Content count

    8,325
  • Joined

  • Last visited

  • Days Won

    393

Marcos last won the day on May 22

Marcos had the most liked content!

6 Followers

About Marcos

  • Rank
    N/A

Profile Information

  • Gender
    Not Telling

Recent Profile Visitors

3,513 profile views
  1. V9 users will receive the mentioned module soon. I'd recommend downloading the ESET installer from www.eset.com and installing it over v9. In case of any issues, uninstall v10 and install it from scratch.
  2. ESET does not use the string "saturation computer" so I'm not sure where you see it. Many legitimate applications utilize ICMP in a non-standard way to send some data so it might not have been an actual attack that was detected and the problems with emails are likely caused by something else.
  3. Microsoft has recently had a problem with expired certificated used for OCSP response. Allegedly they have already fixed it. Are you still having issues? In the mean time, we have also released version 1010 of the Cryptographic protocol support module for v10 users which falls back to CRL if certificate validation via OCSP fails.
  4. Check the About window for a list of installed modules. V10 users should have version 1010 of the Cryptographic protocol support module installed.
  5. There must have been a problem verifying the certificate if this warning was shown. For instance, Microsoft would send an expired certificate used to sign OCSP response earlier today. I've tried to reproduce the issue with www.googleapis.com to no avail. Are you still getting the warning despite having the system time and date set correctly? Check the About window and confirm that you have version 1010 of the Cryptographic protocol support module installed.
  6. If there's a French ESET forum, we are not aware of it but maybe the French partner runs one. As for the warning, I assume you've made a typo and you meant the server outlook.live.com. The issue used to occur earlier today as the certificate used by Microsoft to sign OCSP response was expired. As I understood, Microsoft fixed this earlier today so the issue should be fixed by now. We've also released a new version of the Cryptographic protocol support module 1010 which fixes certificate validation so that if OCSP validation fails, we use CRL as a fallback.
  7. I can confirm that renaming Windows Defender's service executable "C:\Program Files\Windows Defender\MsMpEng.exe" before upgrade solves the issue. During upgrade, WD activates which is fine and expected, however, for some reason it holds ESET's files for too long which prevents ekrn from starting. We are investigating if there's something we could do about it on our part.
  8. Been getting this error until I renamed "C:\Program Files\Windows Defender\MsMpEng.exe" (Windows Defender service executable) before starting upgrade. It appears that WD activates during upgrade (which is fine and expected) but it holds some files for too long that it prevents ekrn from starting. We are investigating if there's something we could about it on our part.
  9. Is the protection status green on the client or some errors are reported?
  10. Check if firewall is deactivated in the advanced setup. You can enforce it via a policy in case it was overridden by another policy. If users have administrator rights, protect the settings with a password to prevent users from disabling firewall or changing Endpoint settings.
  11. Theoretically you could use HIPS rules to block access to certain folders for browser executables. However, users could install a new browser or use a portable version of a browser to circumvent the block.
  12. The answer is simple - home users don't have a problem to pick an option if antiransomware detects a suspicious behavior. In a corporate environment, the action must be taken automatically without causing false behavior detections if performed by legitimate applications. We plan to encorporate antiransomware protection to Endpoint v7.
  13. All features have been there for ages: 1, It's called Smart mode (can be set in the advanced HIPS setup). 2, ESET has employed advanced heuristic, an emulator for running code in a virtual environment for more than 10 years. 3, Set Strict cleaning mode for the appropriate on-demand scanner profile. 4, Available in the on-demand scanner setup since NODv1 if I remember well.
  14. Unfortunately, I have no clue what you mean by " An Eset firewall alert pops up about an insecure firewall being created with an option to revert back to secure default rules". A screen shot might shed more light. I, for one, have no clue how this could happen except that a configuration with this pre-configured and hidden rule disabled was imported.
  15. It sounds like you are rather looking for Data leak protection system. ESET doesn't offer any at the moment.