Jump to content

Marcos

Administrators
  • Posts

    37,932
  • Joined

  • Last visited

  • Days Won

    1,504

Everything posted by Marcos

  1. Are you still having the issue? I've tested it and an offline license file was generated alright.
  2. V7 has already reached the end of life and upgrade to the latest version is now being distributed. V7 not only provides worse protection against current threats but also contains bugs that were addressed in newer versions. V9 is the latest version with official support for Windows XP. New versions also include improvements in terms of performance. As for signatures in Thunderbird emails, nothing has changed in recent years. Basically if it works with v7, it must work with v9 (Windows XP) and v11 as well. If there are issues with newer versions, please contact customer care to assist you with troubleshooting. As for performance issues, try pausing real-time protection and see if it makes a difference. If that doesn't help, try disabling HIPS and rebooting the computer. To start off, I'd need a Procmon log as well as ELC from the computer.
  3. I would strongly recommend contacting your local customer care so that the issue is properly tracked and you get accurate response in a timely fashion. It is important to know the brand and model of the phone as well as the version of Android and Parental Control.
  4. Actually there's no issue with the Carbonite sw, it merely acts as a catalyst. We are working on a fix on our part.
  5. What browser do you use? Did you try to use another one? If you use Firefox, enter "about:config" in the address bar and filter "security.ssl" with a list of algorithms. Please post a screen shot of that screen so that we can see what algorithms are enabled / disabled in the browser.
  6. To start off, drop me a message with ELC logs attached. If too big to attach, upload the generated archive to a safe location (e.g. Dropbox, OneDrive, etc.) and provide me with a download link.
  7. You can find scan logs under Tools -> More tools -> Log files -> On-demand scanner.
  8. In your case it's a backup-related process CarboniteService.exe which is having a handle for an update file open at the time we attempt to rename the appropriate folder. Is it possible to configure the backup sw to exclude the Modules folder at least?
  9. The log is not from a boot. After launching Procmon, select "Enable boot logging" in the Options menu and "Enable advanced output" in the Filter menu. Then reboot the computer, launch Procmon and save the log.
  10. Please provide a screen shot of 1-2 such warnings. Also try the following: - Reboot the machine - Without launching any applications, disable SSL/TLS filtering in the advanced EIS setup and save the changes - Re-enable SSL/TLS filtering - Try to reproduce the scenario.
  11. Please upload the log to a safe location (e.g. Dropbox, OneDrive, etc.) and drop me a message with a download link.
  12. That option is available in consumer products too.
  13. Haven't tested it myself but you can try creating an exclusion for the whole computer with the threat name set:
  14. Excluding a threat from being detected is not a solution unless you want to get infected. Although in this case it's adware and not malware, I would not let even adware run on a computer. If you're getting this alert right after launching a browser, ie. without opening any website, try disabling all extensions that you have installed.
  15. I'm getting the following notice regardless of whether HIPS is enabled or not. Didn't find any difference between HIPS being enabled and disabled. The process ended normally in either case.
  16. Unfortunately, the Procmon log was not from a boot. Please refer to the section "Gather boot log files" in the above mentioned KB article. Before you start logging, enable also advanced output in the Filter menu.
  17. Please provide: - ELC logs - A Procmon boot log created as per the instructions at https://support.eset.com/kb6308/ Upload both archives to a safe location and drop me a message with download links and a link to this topic.
  18. I doubt that the problem is in EIS setup since the ESET firewall allows all outgoing communication in automatic mode by default.
  19. Web structure tells almost nothing about whether a particular page is phishing or innocuous. There are some typical folders that contain phishing pages, such as securedview, paypal/paypal, docusignpro, adobecom, Gdrive, etc. but their names change, folder names may consist of random characters or phishing pages may be placed even right in the web root folder. It is not possible to 100% detect phishing pages just by the address / web structure and there are many things that need to be considered.
  20. Please check if a firewall allows ESET Mail Security to connect to the Antispam servers listed at https://support.eset.com/kb332/#antispam.
  21. For Endpoint you can create a mirror. Consumer products support only online updates from the Internet.
  22. Probably you meant integrating Secure Data into Endpoint and subsequent management by ERA. Unfortunately, that will take longer and Secure Data will not be included in Endpoint v7.0 but in future versions.
  23. Install and update files would be cached by the already existing proxy. I've now realized that the existing proxy requires authentication which is an unsupported scenario. Please configure ESET products to use the existing proxy.
  24. Since you already have a proxy in place, why do you want to use also the Apache HTTP Proxy?
  25. In the Task manager, right-click "ESET Main GUI" and select "Create dump file" while the notice about a crash is displayed on the screen. Also collect logs with ELC. Then compress the dump, upload it to a safe location along with ELC logs and drop me a message with download links.
×
×
  • Create New...