Jump to content

Marcos

Administrators
  • Posts

    37,065
  • Joined

  • Last visited

  • Days Won

    1,470

Everything posted by Marcos

  1. See https://support.eset.com/kb3678/ A newer version of v9 addressing this issue will be released soon. For maximum protection we strongly recommend using the latest version, currently 11.1.54.
  2. If Oracle recommends excluding certain files and folders, you can add those exclusions in the advanced setup.
  3. If you installed v10 using the standard Live installer and not using msi, it should offer you upgrade to the latest v11.1.54. Please uninstall it, download the EIS installer from ESET's website and install it. Should the problem persist, gather logs with ELC and provide me with the generated archive via a personal message. Also check if running a secure browser via the shortcut on your desktop makes a difference.
  4. Monitoring applications are not usually malware but are created for legal monitoring of staff. ESET usually detects them as potentially unsafe applications which is a group of legitimate applications that can be misused in the wrong hands. The detection is disabled by default. Feel free to report such applications to samples[at]eset.com and we'll check if a detection should be added.
  5. If the problem persists after uninstalling Endpoint and installing it from scratch, please gather logs with ESET Log Collector and provide me with the generated archive.
  6. Drag and move it wherever you want the notifications to pop up.
  7. The error is: ERROR: (ConfigInsertPeerCertFile) Checking certificate ended with error 'ParsePfxCertificate: PFXImportCertStore failed with Object already exists. Error code: 0x8009000f'. Path provided - 'C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\EsetRemoteAdminAgent\{B454B5C8-5C87-4F24-B9F5-2A9A199F08F5}\peercert.pfx' If you have ESET File Security installed on that server, temporarily disable self-defense and reboot the computer. Then delete the content of "C:\Documents and Settings\All Users\ESET\RemoteAdministrator\Agent" prior to proceeding with Agent installation. Finally re-enable self-defense.
  8. We have prepared a new version 4.0.88 which addresses the issue. It hasn't been thoroughly tested by QA yet but we've installed it on Ubuntu 18.04 x64 and didn't notice any issues with browsers. It will undergo QA testing soon and then will be released for the public. In the mean time, you can download an EAV for Linux Desktop 64-bit installer from here. 32-bit installers as well as EAV Business Edition 4.0.88 will be available after they pass QA tests.
  9. We have prepared a new version 4.0.88 which addresses the issue. It hasn't been thoroughly tested by QA yet but we've installed it on Ubuntu 18.04 x64 and didn't notice any issues with browsers. It will undergo QA testing soon and then will be released for the public. In the mean time, you can download a 64-bit installer from here.
  10. The same verdict - leaked license that was already cancelled. In order to stay protected, purchase a license and activate ESET Internet Security using the license key you will receive after purchase.
  11. Under the account you've created for ESET, run " SHPIO13.exe displaystructure". Also provide the output of running the command "Shpio13.exe usercount /print /withnames /diag".
  12. By default notifications about successful updates do not pop up. You have to turn off the above mentioned setting.
  13. Using the numeric keys at the top of the keyboard should help if it's Windows XP with ESET v9. It's a known issue which will be addressed in a new build of v9 shortly. If you are using a newer OS than Windows XP, please upgrade to the latest v11.1.54.
  14. First of all, please update to the latest version 11.1.54. You can install it from scratch to make sure that update servers are set correctly in the registry. Should the problem persist, carry on as follows: - In the advanced setup -> Tools -> Diagnostics, enable advanced update engine logging - Manually run update - Disable logging - Gather logs with ESET Log Collector, upload the generated archive to a safe location and drop me a personal message with a download link.
  15. For instance, Apache HTTP Proxy is provided with the ERA All-in-one installer or as a stand-alone installer from https://www.eset.com/int/business/remote-management/remote-administrator/download/#standalone: For instructions how to configure it, read https://help.eset.com/era_install/65/en-US/mirror_tool_windows.html?http_proxy_installation_windows.html. For instructions on using the mirror tool, please refer to https://help.eset.com/era_install/65/en-US/mirror_tool_windows.html.
  16. What error do you get when you attempt to update manually?
  17. EFSW 6.5 doesn't create mirror files for Endpoint 6.6. This will be first supported in EFSW v7. We strongly recommend using HTTP Proxy instead of a mirror to save bandwidth and to ensure that only files that are really needed by clients are downloaded. If you need to use a mirror, use the command line Mirror tool or create it using Endpoint 6.6.
  18. As long as it works and updates are provided for that version (which will be for the next several years), it's ok to use it. As far as I know, the latest version didn't bring any fix for a critical issue that would prevent users from temporarily using a slightly older version of the program.
  19. Developers have reproduced the issue and are working on finding the root cause with highest priority. We'll keep you updated.
  20. It appears that a permissive rule for system with the local port 8770 should solve it. You can also try temporarily switching the firewall to interactive mode. When you are asked about the communication, select to create a rule from the drop-down menu and allow the communication. Then you can switch to automatic mode again.
  21. Please gather logs with ESET Log Collector on one of the troublesome clients and provide me with the generated archive via a personal message. Also create a Procmon boot log from a system start as per the instructions at https://support.eset.com/kb6308/.
  22. This malware was released shortly after we started building the noon update so it made to update 17503 which was released 2 hours ago (at VT ESET isn't updated yet). We made sure that the payload was detected so that our users were protected from the very first moment even if the file was not detected by the on-demand scanner.
  23. The website is not blocked by ESET. If you can prove it with a screen shot for instance, contact ESET as per the instructions at https://support.eset.com/kb141.
  24. Let me understand your use case, when you come home you will never want to connect your notebook to the Internet?
  25. VT is not using the most current engine. The sample is detected: 4646921ee4c0666a15a188dadbffd97632b245b9 » RAR5 » Swift.exe - a variant of Win32/Injector.DYKM trojan
×
×
  • Create New...