Jump to content

Marcos

Administrators
  • Posts

    36,497
  • Joined

  • Last visited

  • Days Won

    1,452

Posts posted by Marcos

  1. Please capture the network communication while creating an all-in-one installer with Wireshark and provide the generated pcap log compressed in an archive. Beforehand close any network-aware application to reduce the amount of data logged in the pcap log.

  2. Quote

    I think yesterday the list was empty and I have, as described above, tried to add the business account with username and password. There was also a message that the ESMC was successfully linked to the business account. Nevertheless, the list is empty. Further attempts ended with the error message that the business account is already linked. 

    Does the license actually appear in EBA?

    image.png

  3. Dobry den,
    ESET File Security pre operacne systemy Windows Server obsahuje od verzie 7 Ransomware stit, ktory vyzname vylepsuje ochranu proti novych druhom ransomwaru. Okrem instalacie EFSW v7 je ale nutne zabezpecit RDP v pripade, ze je povolene (napr. povolit ho iba lokalne a do siete sa pripajat cez VNP, pouzivat 2FA - napr. ESET Secure Authentication, pouzivat silne hesla, na fw obmedzit pripojenie iba z konkretnych IP adries / bezpecnych rozsahov, atd.). Taktiez je dolezite pouzivat plne podporovany OS a pravidelne instalovat bezpecnostne aktualizacie.

    V ESFW odporucame zapnut ochranu nastaveni heslom ako aj detekciu potencialne zneuzitelnych aplikacii, aby v pripade, ze utocnik sa uz nejakym sposobom dostane do siete, resp. na server, nemohol vypnut av ochranu, resp. odinstalovat ESET.

    Taktiez odporucame nezdielat adresare obsahujuce dolezite subory pre everyone s plnymi pravami, aby sa predislo zasifrovaniu takych adresarov zo vzdialeneho pocitaca.

  4. Please provide a complete record (whole row) from the Detected threats log that pertains to the detection. I'd prefer if you could gather complete logs with ESET Log Collector, however.

    If you have Mikrotik router, make sure to install the latest firmware. Routers with older firmware have been a target of attacks recently and a malicious html code was already provided by the router itself. It was subsequently detected in html pages on computers connected to the Internet through the router.

    One should never make a conclusion before investigating what happened or what's going on. If the router turns out to be the culprit, no security software running on a computer could have prevented router infection.

  5. ERROR: (DbInsertCertAuthContent) CStatementSerializerBase: Failed to open file C:\Documents and Settings\All Users\Dane aplikacji\ESET\RemoteAdministrator\Agent\SetupData\Database\SQLite\SetupScripts\Install\2_do_install.sql

    Please copy the following commands to a batch file and run it:

    Quote

    reg export HKCR\Installer\UpgradeCodes\786A20824144DB1449FA500C3A98D88D temp_product.reg

    set "lineNr=4"
    set /a lineNr-=1
    for /f "usebackq delims=" %%a in (`more +%lineNr% temp_product.reg`) DO (
      set line=%%a
      setlocal ENABLEDELAYEDEXPANSION
      set line1=%line:"=%
      set line2=HKCR\Installer\Features\!line1:~0,-1!
      reg delete "!line2!" /f
      set line2=HKCR\Installer\Products\!line1:~0,-1!
      reg delete "!line2!" /f
      del temp_product.reg
      reg delete HKCR\Installer\UpgradeCodes\786A20824144DB1449FA500C3A98D88D /f
      reg delete HKLM\SOFTWARE\ESET\RemoteAdministrator\Agent /f
      goto :leave
    )
    :leave

     

  6. I'd suggest contacting customer care so that the case is properly investigated and tracked. We have a test version of the Internet protection module that contains a workaround for a bug in Windows 10 related to SSL/TLS filtering. There's a chance it could help in your case if you use Windows 10.

  7. Enabling / disabling email client protection does not make any difference in terms of resource consumption or stability; we recommend keeping it enabled even if you don't use email clients on the server. Anyways, you should be able to disable a particular application status notification under User interface -> Application statuses.

    Protocol filtering should be always turned on as long as a computer is connected to the Internet. Even if you don't run browsers to browse the Internet on the server, web protection can save you if a malicious file or script happens to run; in such case it can stop further payload from being downloaded and run. Again, it's possible to disable that application status.

  8. You didn't mention whether it was a document or executable that was attached to the email and which you opened / ran. The best would be if you could send it to samples[at]eset.com for analysis if it is not detected.

    As for the BSOD, I'd strongly recommend uninstalling MBAM since its real-time protection may clash with ESET and cause issues. Should the problem persist, have a dump from the crash sent to customer care for analysis and to determine the cause of the crash. It appears to be network related.

  9. 1, The email would be likely scanned by Web access protection. Make sure that SSL/TLS filtering is on so that https communication is scanned.
    2, Without knowing what product / version and settings you use and checking the email you received, it's impossible to tell what happened. Please provide me with the email that was not detected as well as with logs gathered by ELC from the machine.
    To increase detection efficiency, you might want to use ESET Dynamic Threat Defense (provided as an extra service). If you use Microsoft Exchange or Lotus Domino mail server, with new v7 mail server products you can take advantage of EDTD and have attachments run in the EDTD sandbox and have them evaluated by Augur, the ESET machine learning system. Based on the result of analysis, the ESET Mail Server product can take the appropriate action. This greatly minimizes the gap between a new malware begins to spread and the time a detection is added.
    3, Any infected attachment should be cleaned / removed.

×
×
  • Create New...