Jump to content

Marcos

Administrators
  • Posts

    38,051
  • Joined

  • Last visited

  • Days Won

    1,509

Everything posted by Marcos

  1. You can keep router's IP address excluded from protocol filtering until a fix or workaround is distributed to users via a module update.
  2. Since the logs didn't shed any light, we'll try to obtain the router and reproduce the issue in our environment.
  3. A configuration xml file is version-agnostic and will also work both with EAV and ESS. Only settings that are available in the product will be imported.
  4. Potentially unsafe applications are legitimate tools that can be misused in the wrong hands (e.g. tools for determining serial numbers of installed software, killing processes, tools for remote administration misused by malware, etc.). You can either exclude the file from scanning or disable detection of potentially unsafe applications.
  5. Would it be possible to upload 3-4 of the files to a file sharing service or ftp server and pm me the download link so that I can check them out?
  6. I confirm the block is correct as long as you opted for detection of potentially unwanted applications.
  7. Does disabling real-time protection on the local or remote computer make a difference? What about disabling just network drives in the real-time protection setup? Is the other computer a workstation or server?
  8. To my best knowledge, it's not possible. However, the oldest logs will be replaced with newer ones over time.
  9. What are Rosetta Stone folders? Could you provide us with some examples of files that take long to scan?
  10. I've just tried to update at home and the update was downloaded at speed ~ 1MB/s. Do you mean that you have a fast Internet connection but updates are always downloaded slowly though?
  11. Thunderbird is being evolved very quickly with major changes introduced in every new build, requiring substantial changes to be made to the plug-in as well. Since it's not possible to keep up with the rapid development and maintain quality at the same time, ESET does not support newer versions of Thunderbird.
  12. Do you get 0 files scanned even with Smart optimization disabled?
  13. It's not possible to avoid updating modules as they are a vital part of the product. On the other hand, modules are released for all users only after a long time of testing and being available on pre-release update servers provided that no issues have been reported. Please provide more information as to what website you're unable to access with SSL scanning enabled.
  14. Will the message appear if you close egui via Shift+click on X and start it again from the Start menu? Does the error occur every time you start Windows? Are you able to start an on-demand scan without getting an error?
  15. Exactly as Arakasi wrote. As long as you receive email via POP3(S)/IMAP(S), basically you'll only lose the antispam feature when a plug-in is not available for a particular email client.
  16. Please refer to the KB article hxxp://kb.eset.com/esetkb/index?page=content&id=SOLN2138 regarding supported email clients.
  17. Please also send me a SysInspector log from that machine. Also make sure to install all hotfixes available from Windows Update. If you have hotfix KB2735855 installed, make sure to install hotfix KB2789397 as well as adviced in the KB article hxxp://kb.eset.com/esetkb/index?page=content&id=SOLN3145 or hxxp://support.microsoft.com/kb/2789397.
  18. Hello, if you have a license purchased via Google Play, please pm me your GP registration email address. If you purchased it via ESET's website, pm me your username and password so that we can check the status of your license in our systems.
  19. Currently you can only protect the settings with a password to prevent users from modifying the configuration or disabling protection modules. If you'd like to have an option to prevent users from opening the main gui after clicking the ESET tray icon, please add this as wish to this thread. The wishes posted there are reviewed by product managers on a regular basis when deciding about new features for future versions.
  20. Do you have personal firewall integration set to "All features active" or at least "Only scan application protocols"?
  21. There will always be some files that are exclusively used by the operating system or applications and access for other applications is denied. You can check if you can access files in that folder with elevated admin rights but I assume you won't be able to.
  22. Please send me an example of a non-spam email that was quarantined with the reason "sender has spammy reputation".
  23. What OS do you use? Please install Internet protection module 1097 from pre-release servers again; I'll pm you instructions how to create logs.
  24. HIPS v1107 is now available on pre-release servers. As for the duplicate rules that have already been created, you'll need to remove them manually.
×
×
  • Create New...