Jump to content

Marcos

Administrators
  • Posts

    38,083
  • Joined

  • Last visited

  • Days Won

    1,510

Everything posted by Marcos

  1. No, this is not possible. Pop-up notifications can be set to disappear in 30 seconds at maximum. If user's intervention is required (e.g when cleaning is disabled, ie. set to No cleaning), the window with action selection shouldn't close automatically.
  2. Please check your pm. I've sent you instructions for generating logs that will help us pinpoint the issue.
  3. That should work provided that the correct IP address was added correctly to the list of addresses excluded from protocol filtering and disabling web protection or protocol filtering solved the issue. Perhaps you could post a screen shot of your list of addresses excluded from protocol filtering as well as a screen shot of the router's setup page with the address bar included.
  4. The scanner will attempt to neutralize and remove the threat automatically without user's interaction.
  5. Sometimes people report a blocked website but in fact it's a trojan which was detected on it and the website as such was not actually blacklisted.
  6. I'd say that most of zero-day threats are detected and blocked by the web scanner utilizing advanced heuristics as well as by Advanced memory scanner. We regularly see almost all zero-day threats detected by ESET's detection mechanisms undetected by most of other famous security software. In case of ESET, recognition of zero-day threats is added swiftly which means such threats would be detected by all products regardless of whether they are run or just go through a server (e.g. mail server, file server, proxy server, gateway, etc.).
  7. Quarantined files are stored in a safe, encrypted form on a disk and thus not pose any risk whatsoever. It's not necessary to flush the content of quarantine. Administrator privileges are required to permanently delete quarantined files.
  8. It seems to be the same issues as discussed here. Please continue in that thread so that the discussion is kept at one place. I assume that the problem is with Asus routers not adhering to rfc standards for http communication which may cause issues in conjunction with ESET's http scanner. Providing us with special logs for troubleshooting should help us pinpoint the issue, As a workaround, you may want to exclude the IP address of your router from content filtering.
  9. Unfortunately, this option was first removed in v6 if I remember correctly, however, I've already asked the product manager to bring it back in future versions as it was very useful for me, too.
  10. No, it's a potentially unwanted application, not malware or another kind of threat. You can exclude it from scanning directly from within the yellow notification window.
  11. It could be that you're using Deep Freeze which will not save the status of protected folders in thawed state.
  12. I'd suggest enabling logging of blocked operations in the advanced HIPS setup, reproducing the problem and then checking the HIPS log for detailed information about the rules that caused some blocking. This should show which rules need to be adjusted to allow the blocked operations. We'd appreciate if you could tell us what rule is causing the issue.
  13. The number you're referring to probably means the number of files that have gotten through real-time protection but it doesn't necessarily mean they were scanned.
  14. Without knowing what is detected and under what name, it's impossible to tell whether the detection is ok or not. Maybe it's a PUA which is detected and in such case it shouldn't be considered FP.
  15. Currently it's not possible to delete / quarantine only archives with at least one executable file inside. However, this is a feature that we'd like to have added as soon as possible.
  16. V6 and v7 have better detection of phishing than other versions. The next generation of Endpoint will utilize the same anti-phishing system.
  17. Have you tried installing ESET NOD32 Antivirus to see if it makes a difference? If it doesn't, try disabling web access protection and protocol filtering, one at a time. Also confirm or deny that you have AdMuncher installed.
  18. The good news is that we've pinpointed the issue. It will be fixed in the Internet protection module 1092 which is going to be released to pre-release update servers some time soon.
  19. Installation is accomplished by Windows Installer. If there's a serious problem with Windows Installer or the operating system as such, sometimes the only way to get things working is to reinstall the oper. system (although this should be basically very rare).
  20. ESET is known for an extremely low number of false positives. If you suspect that ESET is erroneously detecting a legitimate file, please report it as per the instructions here. As for the option for excluding a file from scanning being grayed out, that's because only potentially unwanted and unsafe applications can be excluded directly from within the alert window.
  21. I'd suggest using automatic mode until a newer version of ESS addressing the issue is available.
  22. Kryptik detections are detections of the packer and doesn't tell anything about the malware itself. I'd suggest submitting a couple of encrypted files along with a file containing instructions how to get the decryption key to ESET to confirm they cannot be decoded.
  23. I'm getting an error sec_error_inadequate_key_usage, is it the same error as you're getting? I've found the same issue reported by a Kaspersky user here: hxxp://support.mozilla.org/en-US/questions/950736. It seems that connection to google, youtube and maybe some other servers is not allowed by Firefox when a self-signed certificate is used. Tested with Opera and IE, no problem accessing the websites noticed.
×
×
  • Create New...