-
Posts
36,300 -
Joined
-
Last visited
-
Days Won
1,444
Posts posted by Marcos
-
-
I estimate the next hotfix of Endpoint v11 could be released in about 1 month,
-
Diagnostic logging can be enabled only temporarily in client details where you can subsequently view them:
-
An offline license file must be created with a username and password included in EBA:
-
Please provide me with the offline license file that you have used.
-
ESET researchers have discovered NSPX30, a sophisticated implant used by a new China-aligned APT group we have named Blackwood
-
Please contact the retailer as it seems they activated ESET using someone else's license.
-
It's the email address of the license owner. Did you purchase your license from Adeon SK, our distributor in Ukraine?
-
A verification email was sent to ixxxxxxxxxa@outlook.com.
-
You can't install ESET CyberSecurity v7 as it requires MacOS 11+.
You should install ESET CyberSecurity v6 which installs on MacOS 10.12+: https://help.eset.com/ecs/6/en-US/?ud_ena_intro_requirements.html.
-
Does it happen even if you disable scanning of network drives in the real-time protection setup? Does pausing only real-time protection make a difference?
Please carry on as follows:
- Temporarily disable Protected service in the HIPS setup
- Reboot the machine
- Start logging with Procmon
- Reproduce the issue
- Stop logging
- Save the Procmon log unfiltered in the PML format and compress it.
- Collect logs with ESET Log Collector and upload the generated archive along with the Procmon here.
-
This was a FP which was fixed about an hour ago. We apologize for the inconvenience.
-
Please raise a support ticket regarding questions about API.
-
It appears that logging was enabled for a longer time. EpfwLog.pcapng has grown to 1,17 GB and therefore could not be collected by ELC.
1, Please clear the content of the C:\ProgramData\ESET\ESET Security\Diagnostics folder.
2, Then enable advanced logging under Help and support -> Technical support.
3, Run update and reproduce the issue with update servers being unreachable.
4, Stop logging
5, Collect logs with ESET Log Collector. -
What on-demand scanner profile did you use in the scan? Could you create one with archives, sfx archives and email files turned OFF and Smart optimization turned ON? Does such scan complete quicker?
-
Unfortunately I'm not well versed in PowerShell. It's rather a question for PowerShell experts in the appropriate (probably MS) forum.
-
It was confirmed by developers that the "Blocked" list contains urls that are not scanned for malware and are blocked. Please make sure to remove the url frm the "Blocked" url list.
-
I'd recommend checking the spam folder, the verification email was sent to your email address pXXXXXXs@hotmail.com. Anyways, I've received a response from ESET LLC that they have deactivated auto-renewal for your license.
-
It appears that you have eventually verified the ownership and added the subscription to your ESET HOME account ziXXXXXXXXXXXXXXly@hotmail.com.
-
While it is possible that in the future it will be possible to manage also Parental Control for Windows via https://parentalcontrol.eset.com/, we can't promise it as of now.
-
7 minutes ago, itman said:
Eset does now detect it as "A Variant Of MSIL/AVBDiscSoft.A Potentially Unwanted Application" per recent VT
The detection is from Sept 2023 plus we'd been monitoring it for several months before.
- d3adfish and notimportant
- 2
-
ESET CyberSecurity v7 natively supports ARM CPUs. Other ECS features will be added throughout this year.
-
If you attach a device that is blocked by Device Control, it should appear in the Device Control log on the endpoint as well as in the appropriate DC reports generated by ESET PROTECT.
-
The management agent for MacOS can be downloaded from https://download.eset.com/com/eset/apps/business/era/agent/latest/agent-macosx-x86_64_arm64.dmg.
-
Is there a function to block a program from modifying a file?
in Quick questions by guests (registration not required)
Posted
You can create a blocking HIPS rule for file operations, for any source application, for the desired target files or folders and for the "write to file" operation selected.