-
Posts
35,860 -
Joined
-
Last visited
-
Days Won
1,429
Posts posted by Marcos
-
-
43 minutes ago, persian-boy said:
Hi Eset, Parental control get bypass if you use a proxy extension(with SSL/TLS encryption) for browser! whats the solution?whats the point with Eset root cert? I thought its supposed to monitor encrypted connections.
This has nothing to do with SSL/TLS filtering since the website does not use explicitly https. For https they are using an expired certificate.
-
Quote
that's right.its a bug but you never fixed it : (
I'm sorry but I have absolutely no clue as to what we were supposed to fix.
-
I assume the screen shot was taken from client details -> Configuration -> Applied policies.
Do you see EFSW installed in client details -> Installed applications?
-
6 hours ago, Azure Phoenix said:
I believe you meant firewall rules. HIPS supports wildcards, the firewall doesn't.
I indeed meant HIPS rules. Wildcards are only supported in registry paths AFAIK.
-
I assume you mean an HTTP proxy instead of ERA proxy since it doesn't make sense to have both ERA Server and ERA Proxy in a network. If all computers are in the same network, use just one http proxy.
-
ESET Smart Security is now called ESET Internet Security. ESET Smart Security Premium is EIS + Password manager and Data encryption module. For differences between products, please read https://www.eset.com/int/home/for-windows/.
-
HIPS is as crucial protection module as real-time protection and should always remain enabled. Disabling HIPS also disables self-defense, Advanced Memory Scanner, Exploit Blocker and Ransomware Shield. That said, disabling HIPS substantially deteriorates protection, detection and cleaning capabilities of the installed ESET product.
As for HIPS rules, wildcards are not supported. Disabling HIPS (not recommended) requires a computer reboot for the change to take effect. Just to make sure that you perform a full computer restart, run "shutdown -r -t 0". With default HIPS configuration (ie. no custom rules created) you should get no prompts for action and yet it will provide protection against newly emerging threats.
-
Please configure Windows to generate complete memory dumps: https://support.eset.com/kb380. After a reboot, reproduce the issue and trigger a manual crash. After rebooting the machine, compress the dump, upload it to a safe location and drop me a private message with a download link. Also collect logs with ELC and provide the generated archive as well.
-
Unfortunately, it's not clear what you mean by " I found out that only the Alpha personality was present in it, i.e. the Free Trial".
There is no separate trial version installer and you can either activate a trial version or enter a license key to activate a paid version. There's no way that more license keys would be used to activate a product at a time.
Also it is not clear what you meant by " Out comes the Free Trial of ESET and blocks a folder. A totally legitimate folder! " What folder? ESET does not block access to folders.
-
They are for updating v8 which is still in the phase of basic support and will reach its EOL at the end of this year.
-
Yes, using a mirror results in a big amount of data being downloaded with each update even if 90% of the files will never be needed by clients. Therefore if you want to save traffic, use an HTTP Proxy so that only files actually needed by clients will be downloaded and cached.
-
You don't need any username/password to download, update or activate ESET. Simply use the license key for activation.
-
Make sure that LiveGrid is enabled. It's a fundamental functionality to ensure fast response to new borne malware. It shouln't have any effect on the discussed issue.
-
Does temporarily disabling Connected Home Monitor in the advanced setup make a difference?
-
Your computer was infected with JS/Adware.Revizer.A. If I remember correctly, it misuses a legitimate driver for malicious purposes. Please provide me with logs collected by ESET Log Collector.
-
Try entering your registration email address here:
https://www.eset.com/int/support/lost-license/
If you don't receive any email, please contact your local customer care.
-
12 minutes ago, Piyanatn said:
I have the same problem
Please temporarily uninstall v11.2.49 and install v11.0 that is downloadable from the previously mentioned KB. A hotfix version 11.2 will be available soon.
-
Unfortunately you didn't mention the whole detection name. If you meant Java/Kryptik.UF trojan, this detection is from March 2018. Please report it to ESET as per the instructions at https://support.eset.com/kb141.
-
Does temporarily pausing web access protection make a difference? If not, what about temp. disabling protocol filtering in the advanced setup? Are you having issues only with https websites and http websites open alright? What operating system do you use? Do you have any 3rd party security or web filtering applications installed?
-
What particular websites are blocked that shouldn't be? There are quite many websites logged in the Web Control log but it doesn't look like every single website was blocked.
-
Please collect logs with ELC and provide me with the generated file. If too big to attach, upload it to a safe location (e.g. Dropbox, OneDrive, etc.) and provide a download link.
-
There are no such short-term plans.
-
6 minutes ago, RvW said:
This is what I presumed, Marcos. But this leaves users in doubt: I open ESET's secure browser and the first thing I see is an unsecured web page. Can this be changed?
I'm not sure if it will be possible but we have already created an improvement ticket for developers where they can comment on feasibility.
-
1 hour ago, nonamelab said:
Description: Allow URL addresses beside IP/IP Ranges input in Firewall Rules
This is not possible since only IP addresses are known to the firewall. Unlike firewall, web access protection works at the highest application level in the OSI model and has information about hostnames as well.
You can try enabling SSL/TLS filtering for all applications under Web and email -> SSL/TLS -> Filtering mode: Policy mode.
In case of any issues with SSL/TLS filtering in certain applications, you can adjust SSL/TLS scan mode for particular applications:
SSL cert valid with endpoint v6 but invalid with v7
in ESET Endpoint Products
Posted
Try the following:
- disable SSL/TLS filtering
- make sure that no browser or email client is running (check the task manager to make sure)
- re-enable SSL/TLS filtering so that a new ESET root certificate is generated
Does that resolve the issue?