-
Posts
36,137 -
Joined
-
Last visited
-
Days Won
1,439
Posts posted by Marcos
-
-
I'd recommend raising a support ticket since this will need to be investigated further.
Also please download DeviceTree from https://forum.eset.com/files/file/130-devicetree/ and create logs:
1, Prior to first connection of the device
2, After connecting the device
3, After disconnecting the device and re-connecting it. -
To je bohuzial technicke obmedzenie systemu, v tomto pripade sa YB aplikacia neda zablokovat.
-
-
1 hour ago, Yaroslav said:
Here is the link for mailtest:
https://www.mail-tester.com/test-y8tg7zxt0
Could you please assist?
Please let me know if any additional information is needed.
This email is not currently evaluated by ESET antispam as spam.
-
As fabricated images, videos and audio clips of real people go mainstream, the prospect of a firehose of AI-powered disinformation is a cause for mounting concern
-
Could you try installing v16.2 from scratch with default settings? If you schedule another task (e.g. to run an application), is it run automatically at the scheduled time? If you create a new update task while keeping the default one, is it run automatically?
-
What is the correlation between the above links and ESET?
-
10 hours ago, QuickSilverST250 said:
I have some apk files i want to check but to exceeds the limit so will email a wetransfer link for them
Is it detected by other vendors or it exhibited suspicious behavior when you installed the application? It is not that an arbitrary file can be submitted and it will be analyzed by humans. We need to know what makes the file suspicious to you. Moreover, if only a link is submitted the file cannot be pre-processed automatically for analysts.
-
Did you change the EH email address via EH? I still see it added in the original EH account. Couldn't it be that you have created a new ESET HOME account instead of just changing the email address in EH?
-
Please check if update is run if you right-click the regular update task in Scheduler and select "Run now".
Is there any reason why you have not upgraded to the latest version 17.0.16 yet? Could you try uninstalling v16.2 and installing v17.0.16 from scratch with default settings?
-
This was a false positive which has been already fixed. You can restore the file(s) from quarantine.
-
Both email submissions to samples[at]eset.com and via the built-in submission form are supported, basically it should not matter which one you prefer.
-
Please raise a support ticket since this will need to be checked on the backend.
-
Since you already have v16.2 as you say, you don't need to install it again.
-
Just now, Zardoc said:
Why is this taking so long? Even if this is not a serious issue it just makes Eset loose credibility on a lagging issue.
I have around 40 licences circulating and my customers don't like problems especially with their anti virus.
That's because it's somehow related to the recent certificate change (SHA2->ACS) and it requires cooperation with Microsoft to figure out the root cause.
-
We've checked all the files you've supplied. There was only one trivial JavaScript downloaded that has been added: JS/TrojanDownloader.Agent.AAOS trojan. Nevertheless, the payload () has been detected as PowerShell/TrojanDownloader.Agent.HLI trojan since February 12.
The other files are not subject to detection.
-
-
Is ESET correctly registered in the Security Center? There are error like these in the system application log
The Windows Security Center Service was unable to load instances of AntiVirusProduct from datastore., 08/02/2024 12:00:24
The Windows Security Center Service was unable to load instances of FirewallProduct from datastore., 08/02/2024 12:00:24Message, Date
Faulting application name: wmiprvse.exe, version: 10.0.19041.3636, time stamp: 0x71c3372a
Faulting module name: unknown, version: 0.0.0.0, time stamp: 0x00000000
Exception code: 0x80131623
Fault offset: 0x00007fff9252200f
Faulting process ID: 0x2f00
Faulting application start time: 0x01da5a88c604f1c1
Faulting application path: C:\WINDOWS\system32\wbem\wmiprvse.exe
Faulting module path: unknown
Report ID: c08a42dc-4259-4926-b81c-e9e550a4252f
Faulting package full name:
Faulting package-relative application ID:, 08/02/2024 12:17:25Could you try to rebuild the WMI repository to make sure that those errors do not occur and wmiprvse.exe doesn't crash?
-
The issue with annoying logging is being worked on. If you mind the error messages in the system log caused by a certificate change (expiring SHA2 -> ACS), you can temporarily use the older version signed with the SHA2 certificate while the issue is being investigated.
-
This will need to be checked via a support ticket. Please raise one and provide:
- TenantID (can be retrieved from https://aad.portal.azure.com/-> Azure Active Directory -> Left Blade Menu -> Click Overview -> See the tenant information
- Domain Name
- EBA Account
- ECOS instance (EU or US) -
Running multiple real-time protections concurrently should be avoided, otherwise it may cause various issues when they attempt to access and read or block a file at the same time.
-
We use Windows Installer msi packages which means that if an important related registry value has been removed in the mean time, standard uninstallation by Windows Installer may fail. This doesn't happen normally, especially not on home systems that are not in a domain where installation was not done via GPO. One could hardly find a report of a failed uninstallation from other users in this forum. If there's a problem uninstalling ESET for whatever reason, we have the ESET Uninstall tool for use in safe mode.
If the problems with network occurred after running the ESET Uninstall tool, we'd like to bring this notice to your attention:
-
The price for the remaining period of your curent license would be subtracted from the price for the license that covers all machines with the newly added ones.
-
We do not provide website cleaning and monitoring services. Sucuri is a professional company that provides such services for fee.
Exclusion for vulnerability scanner
in ESET PROTECT
Posted
The vulnerability scanners uses a local module with data to determine if a vulnerable software is installed. However, in order to patch found vulnerabilities, it connects to particular vendors' websites to download fixed versions of products.