Jump to content

Marcos

Administrators
  • Posts

    36,983
  • Joined

  • Last visited

  • Days Won

    1,467

Posts posted by Marcos

  1. Please carry on as follows:
    - enable advanced logging under Help and support -> Details for customer care
    - run the command-line console and type ([Enter] means to press Enter):

    set NSPR_LOG_MODULES=SMTP:4,IMAP:4 [Enter]
    set NSPR_LOG_FILE=%HOMEDRIVE%%HOMEPATH%\Desktop\tbird_log.txt [Enter]
    start thunderbird [Enter]

    - reproduce the issue
    - close Thunderbird
    - stop advanced logging
    - collect logs with ESET Log Collector
    - provide me with the archive generated by ELC and "%HOMEDRIVE%%HOMEPATH%\Desktop\tbird_log.txt"

    I would also recommend opening a ticket for your local customer care and providing them with the logs so that the case it tracked properly and timely response is ensured.

  2. MacOS Catalyna is to be released in the fall. We officially support only final versions of operating systems, not betas since a lot can be changed under the hood before the new MacOS is released which could break ESET's functionality. At the time of the official release of the new MacOS, we should have a compatible version of ESET CyberSecurity and ESET CyberSecurity Pro at your disposal.

  3. Honestly, it surprises me that you don't want to be notified about errors but want to be notified about threats. The thing is almost all the above mentioned errors may indicate an issue with protection and as a result the machine can get infected. Hence the question why not to be notified in advance about potential issues to prevent infection.

    If you want to be notified about unresolved threats and not get any notifications about errors, change the minimum verbosity (well, actually it's rather severity) to critical.

  4. Before making any conclusions, please contact samples[at]eset.com and provide the following stuff from the affected machine:
    - logs collected with ESET Log Collector (ESET must be installed and activated beforehand if it's not)
    - a handful of encrypted files (ideally Office documents)
    - the ransomware note (payment instructions).

    If the files were encrypted by a 100% legitimate tool, such as PGP, it's not obviously possible to detect such. An attacker might have hacked in via RDP and use it to encrypt files. If that's the case, what failed was not the AV but the security of the system which should have prevented remote attacks via RDP. However, without logs we can now only speculate what happened but the requested logs may shed more light.

  5. I think it was because your previous license expired about 2 weeks prior to renewing the license. In such case, it takes a little bit until license information is updated on servers. Had it been renewed on time, the product would have continued to work seamlessly after the renewal.

  6. I assume the application is detection as potentially unwanted. The detection is correct then. If you think that benefits of using the application outweigh possible risks (e.g. installation of toolbars, displaying ads or whatever PUAs can do), you can exclude it from detection by the detection name as follows:

    image.png

  7. It depends on how many files you have on the disk and on the type and size of the files. For instance, if you have a big number of iso images that are several GB in size, it will take ages to unpack them all and scan all files inside. Try running a scan with archives disabled and see how big difference it makes. Also make sure that you have LiveGrid reputation system as well as Smart optimization enabled which by default is.

  8. HIPS currently doesn't support wildcards in file paths. By blocking a very few suspicious names that malware may use won't make your system safer given that in more than 99% of cases malware would use a different name than those above.

    ESET protects you regardless of what file names malware use. Plus there is also lot of fileless malware that resides in the registry, WMI, UEFI. For a list of technologies that protect our users at various layers in the system, please read https://www.eset.com/int/about/technology/.

    If you have a real use case that you try to resolve, please provide more details on it.

×
×
  • Create New...