Jump to content

Marcos

Administrators
  • Posts

    37,013
  • Joined

  • Last visited

  • Days Won

    1,469

Posts posted by Marcos

  1. It's a potentially unwanted application which is an optional detection. If you think that benefits of using a particular PUA outweigh possible risks, you can exclude it from detection (Exclude signature from detection), e.g. through advanced options in the yellow alert window.

  2. Does temporarily disabling integration with MS Outlook and (or) protocol filtering in the advanced Endpoint setup make a difference? If not, what about temporarily disabling the ESET firewall or Network attack protection or Botnet protection? Those are protection modules that may affect network communication.

  3. Please carry on as follows:

    1, Temporarily set Debug verbosity for trace logging in the ESMC Server setup:
    image.png

    2, Start logging with Wireshark

    3, Change the repository to any address (may be a non-existent)

    4, Change the repository to Autoselect (this will enforce a connection to the repository).

    5, Wait a few seconds, then stop logging in Wireshark.

    6, Save and compress the Wireshark log and upload it here along with the trace log.

  4. It's all just about smart optimization, nothing else and nothing more. It's caused by obfuscation that the txt file was not detected.

    1, Advanced heuristics doesn't scan scripts, there's a script scanner for that and the command-line (AMSI) scanner on Windows 10.
    2, Scripts are not run sandboxed.
    3, HIPS doesn't monitor file operations but real-time protection does.

    We'll try to address it asap but if turns out to cause more harm then good then we'll probably leave it until it's addressed in a smarter way in the future utilizing HIPS.

  5. Pushing the reset button must always work since it's a hardware reset, not a software one. It's like if turning the power off and on would not make any change which can't be obviously true.

    Please enable triggering of manual crash as per https://support.eset.com/kb380/, configure Windows to generate active memory dumps, restart Windows and reproduce the freeze. After a few seconds trigger a crash manually so that a memory dump is generated. After a reboot, compress the dump, upload it to a safe location. Also collect logs with ESET Log Collector and upload it as well. Finally drop me a private message with links to both files.

×
×
  • Create New...