Jump to content

Marcos

Administrators
  • Posts

    37,767
  • Joined

  • Last visited

  • Days Won

    1,497

Everything posted by Marcos

  1. I've noticed that sharing violations occur on C:\Database\tempres.bin. Was the Procmon log created with v4, v5 or v6 installed? I assume you're using Windows XP, could you confirm? As for the issue with v7, could you try installing it again, now without importing settings from a previous version? If the problem persists, please create one more Procmon log with v7 installed. In that case, it'd be most likely a known issue of legacy drivers that could only be fixed in the minifilter driver used on Windows Vista and newer.
  2. The thing is you're looking at the Web protection settings -> URL address management on the client but in the Configuration editor you have a Web control setup window with rules open. Web access protection and Web control are different features although both allow for blocking URL. While URL address management is a part of Web protection, Web Control is an equivalent to Parental Control in home version.
  3. Code emulation is a kind of a task that can only be performed sequentially. It's not that we now have multi-core processors and every single application will benefit from it when performing its tasks. As I wrote, if several scans are run at once (e.g. on mail servers), scanning threads are run by separate cpu cores simultaneously which increases the overall scan performance.
  4. We've been unable to reproduce it. After updating a fresh v7 beta and restarting Windows, the text "Enable Exploit Blocker" is always displayed.
  5. Please contact the French Customer care via this form. For licenses ordered via the web, you should get an email with your license details within a few minutes after purchase.
  6. Regular automatic updates are attempted on an hourly basis by default as long as the computer is turned on.
  7. If disabling real-time protection actually helps, the only operations performed by real-time protection are those with ekrn.exe process. Other modules do not perform file operations and even network operations are performed by ekrn.exe. I have a long-time experience analyzing Procmon logs and various issues related to ESET products so I'm sure I'm not mistaken
  8. Please refer to my previous post and post information about the modules installed.
  9. Your policy was properly applied to my Endpoint client after connecting to ERAS v5. Could you please post a screen shot of your Web control rule setup to make sure you're looking at the right setting?
  10. System variables should work, user variables not as they are not available in the local system account.
  11. I have replied to your pm. As for Procmon logs, you'd see ekrn opening a file for scanning (CreateFile operation) if one is actually scanned. I didn't find any such records about the time the issue manifested.
  12. It's because you run only one file scan at a time. If you ran 2 scans simultaneously, 2 CPU cores should be utilized, one by each scan.
  13. From my personal experience, ESET detects much more PUAs than any other competing products. Even if they start detecting a certain PUA, they remove detection after receiving a complaint from the application's vendor, most likely because further disputes with vendors always require a lot of investigation which is time and resource consuming. Also I'd like to emphasize that unlike some other vendors, ESET only detects files that actually pose a risk, ie. configuration files, images, text files, etc. are not detected and removed. They files are often installed with potentially unwanted applications. Therefore, in order to remove PUAs completely, we always recommend running uninstall via the Control panel -> Add/remove programs rather than deleting exe and dll files only.
  14. You purchase a license for a particular product which will entitle you to download and update any version of the product. With an ESET Smart Security license, you can also download and update ESET NOD32 Antivirus, if needed but not vice-versa.
  15. Please post information about installed modules from the About window.
  16. I just wonder why one would want to downgrade given that newer versions address issues from the previous ones and protection against threats is improved as well.
  17. There are no update servers in Middle East, however, generally users in this region update from the default servers fine.
  18. ESET products protect users against malware regardless of what browser is used.
  19. Why not install v7 now and report potential issues before the final version is released? Although the current beta is as stable as release versions, you might run into an issue after the release when it would be too late and you'd need to wait for the next service release containing a fix.
  20. I see. Your issue with egui crashing is resolved in the next beta which should be made available within a few days.
  21. I've tested it and the list of blocked addresses was applied properly on the client. Perhaps you could provide me with the policy you use (xml file) so that I can check if there's something wrong with it.
  22. You can edit this value in safe mode or after disabling self-defense and restarting the computer.
  23. Just to make sure, do you have scanning SSL disabled?
  24. Please provide a memory dump from the crash so that we can determine the cause.
×
×
  • Create New...