Jump to content

Marcos

Administrators
  • Posts

    37,934
  • Joined

  • Last visited

  • Days Won

    1,504

Everything posted by Marcos

  1. So the question is if the computer has connected to the Internet at least once after installing Endpoint. Offline license files are intended for use only on completely isolated computers that never connect to the Internet.
  2. Did you use an offline license file to activate Endpoint only on computers that never connect to the Internet? If those computers connect to the Internet, activate them from ERA or manually from the main gui.
  3. First of all, please post in English so that moderators and other users understand you and could help. Unsurprisingly asking about the best AV in an ESET official forum won't yield other answers than ESET. Honestly, with ESET's products you won't make a mistake and I'm not saying that just because I'm an ESET moderator. I recommend reading this page for information about genuine technologies that ESET uses to protect you from emerging threats: https://www.eset.com/int/about/technology/.
  4. If I remember correctly, Filezilla is bundled with Fusioncore PUA. When it comes to PUA detection, the user is asked for action selection. Besides selecting "No action", one can expand advanced options and select exclude from detection.
  5. A changelog will be posted after the new version has been released for all users. The biggest change are more frequent updates to ensure even faster response to new threats.
  6. Updates from a mirror over https are supported only in new versions. If you mean ESET File Security v4 for Linux, a brand new version will be available later this year. If you mean Business Edition for endpoints, I'd strongly recommend upgrading to the latest version of Endpoint 6.6. V4.2 is too old and cannot provide sufficient protection against emerging threats.
  7. It is not clear to me what you would like to achieve. Do you want to keep detected files intact and create a copy of them in quarantine? Because I understand quarantining as moving detected files to quarantine which is done when cleaning threats.
  8. Is she using Windows XP that she has v9 installed? If not, then I'd suggest uninstalling v9 and installing the latest v11. Also is it ESET NOD32 Antivirus or ESET Smart Security installed?
  9. Unfortunately, you've posted in the General forum so we don't know what ESET product and version you are using. Please provide that info so that we can move this topic to the appropriate forum. Also let us know if disabling protocol filtering in the advanced setup make a difference.
  10. Did you remove the license by uninstalling ESET Mobile Security or what exactly did you do? Please drop me a private message with your email address associated with my.eset.com.
  11. Please read https://askubuntu.com/questions/145902/unable-to-mount-windows-ntfs-filesystem-due-to-hibernation/532753 for instance.
  12. Later this year. No exact date has been set yet. We'll keep you posted.
  13. All recent ESET products support WSL in terms of real-time protection. There's no specific setting for that, however.
  14. First of all, please post in English, otherwise most moderators and users will not understand you and won't be able to help. ESET is fully compatible with Windows 7. We even still support Windows XP with ESET consumer products v9.
  15. Malicious domain? Which one? I see that egui contacted ocsp.comodoca.com to check if the certificate used by a particular server has not been revoked. This could happen if ESET warns you about an untrusted certificate and you check certificate details from the warning window.
  16. This will be supported as of Endpoint v7 / ESCM (ERA v7) which will enable you to control how policies will be applied against each other and against local settings
  17. Please refer to https://support.eset.com/kb374/ and https://support.eset.com/kb3641/. We strongly recommend using an HTTP Proxy instead of a mirror to cache install and update files to save bandwidth and to use update files effectively, without downloading files that will likely never be requested by clients.
  18. If you download eicar from https://secure.eicar.org/eicar.com, is it detected by real-time protection and cleaned automatically? Does it appear in yellow in the ERA Console, ie. as an inactive threat? Also please check the details of the active threats and let us know what scanner (on-demand or real-time) is listed there.
  19. Unfortunately, migration between different types of databases is not supported.
  20. Sync issues occur if a particular email is modified concurrently, e.g. when scanned both on the server and client at the same time or when downloaded on more devices. If email is scanned on the email server, you can disable integration with Outlook. We've been working on a plug-in overhaul last months which will prevent sync issues and it will be included in Endpoint 7.0.X.
  21. First of all, please collect logs with ELC and drop me a message with the generated archive attached. The last Filecoder.NPA we've got is from January 2018. It could be that an attacker remoted in via RDP and disabled protection prior to running the ransomware. The logs should shed more light.
  22. I'll check if the version of VA downloadable from the mentioned website is really 6.5.31.0. This version has ERA Server v6.5.417.0 included which is supported by the repository.
  23. It was most likely downloaded when opening a another website which was either compromised or downloaded it on purpose. That CoinMiner was detected and blocked. All you can do is avoid visiting websites that load CoinMiner if you don't want them to be detected.
  24. Which of the above packages did you select when creating a Software install task?
×
×
  • Create New...