Jump to content

Arakasi

Members
  • Posts

    2,411
  • Joined

  • Days Won

    71

Everything posted by Arakasi

  1. Viber can go take their stupid company and hold up shop at Antarctica, because i hope their client base goes under and every person in that company poops their pants. Lame posers. Those type of 2 year old comments hit me where it hurts. So i will give them a 1 year old baby response as well. LEARN TO MAKE APPLICATIONS RETARDOS
  2. Windows 8 machines now come with encryption on certain partitions by default if they are from manufacturers. The drive may be accessible but other parts are not due to the way they have embedded windows licensing into the motherboards now. Truly retarded, but that was Microsoft's way of fighting windows licensing piracy which has been incredibly easy on windows in the past 7 and before. There are still a few well built utilities that can pull the keys once booted. That would be the end of this topic though, as piracy discussion is not aloud. To get assistance with Sysrescue, i recommend phoning into support if all the normal troubleshooting has been performed from this KB article : hxxp://kb.eset.com/esetkb/index?page=content&id=SOLN3509
  3. Threats will still be detected on the ports they come in on by TCP/IP or UDP. You dont need the plug in actually installed in the client.
  4. Hello, The first thing that comes to mind, is the ERA policy deployed, the settings that are different from client to server, a question would be are you running ESET mail security, or relying on file security and endpoints only ? Are you using Endpoint Antivirus, or Endpoint security on your clients, or a combination of both ? This separates disk level detections from network level detections. We are going to need to pour through logs to get some of the questions being asked. I recommend contacting ESET directly, opening a ticket so we can track, and do all this in a more organized and professional format, like we do in the field or as sys admins. Try this link: https://www.eset.com/us/support/contact/ Or hxxp://www.eset.com/us/about/contact/ The severity seems a little too high for a few forum posts, and requires a more detailed analysis. I hope we can help.
  5. My apologies, i wasn't sure if the OP was using the new one.
  6. Is this a laptop ? A windows 8 computer ? Secure boot keys?
  7. I would be checking to see if your running under public or private and also take note of your subnet and see if ESET added it to the list of trusted zones. Also verify if the network adapter is using the filter or not.
  8. A moderator like marcos will know better than me, however. i would create a new policy, containing only mac rules and changes; then assign that one to your macs only.
  9. See link hxxp://kb.eset.com/esetkb/index?page=content&id=SOLN166
  10. Hello Bad config file ? Client has registry issues ? Could be a number of things. i would recommend phoning into support, if you want a quick solution. I can stick with you here should you choose to fix it by KB articles and suggestions n tips here.
  11. Access isnt a very bad choice. It should be common knowledge about db that sql is faster more powerful and can handle large data. i have used era on a couple dc for smaller networks with no issue. 20 or less endpoints.
  12. Hello again Append tag messages to received and read email to all scanned mail This can be found in the policy manager under: Windows desktop > Kernel > Settings > E-mail client protection > Append tag msg options On the client under Advanced Setup > Network > Connection View Since connection view is for the client and caters to the person using it, i do not think ESET has incorporated this into ERA. I do not see it either. On the client you should see a Rules and Zones tab. Under Rules tab is where you will find the place to create new, and edit existing rules.
  13. There are a plethora of objects that could prevent a push installation, i would advise contacting support, or try following the KB again.
  14. I have upgraded 1 endpoint and played, but have not upgraded my clients ERA's and deployed the new versions everywhere yet. Thinking about doing it tonight or tomorrow for 1 client with 72 endpoints, and 1 client with 15. To get an idea for a medium network vs a small one. I will post thoughts, likes, dislikes etc after the fact.
  15. Hello Hamzah, you make some decent points, but i also have rebuttal. You can change the option of notifications from 10 down to 3 already. A little true about quarantined files, but there is also situations where a vendor got added to the av db list, and they want to fix the problems in their program and then request ESET check it out again to be removed from the list. Well if it didnt rescan the program would remain moved on the users computer unless, like you said, an advanced user and understands to go check etc. I am a huge networking fan myself as well, and i would also like to see more networking functions, even if tied in with the firewall module.
  16. Yes ERA is all you need to change the settings around on your users so they cant do anything, and you can allow a sysadmin to manage and reboot during non production hours. See my attached pic for policy location.
  17. So all the users that login to your terminal server have administrative privileges ?? If so this is not a great idea, and i don't recommend it unless absolutely have to. It is also a security risk. -Source:Technet - hxxp://technet.microsoft.com/en-us/library/cc720539%28v=ws.10%29.aspx I am working on a solution. You may be able to do this through the Local Security policy which would conclude by adding whatever account ESET uses to initiate a restart, and ensure it does not have the restart capability, while still maintaining elevation for fighting malware and interacting with crucial windows services and files etc. I am not entirely sure, but i thought the Remote Administrator Console for ESET had the option of either suppressing user restarts or similar to assist with these situations as well. Another solution would be to remove the Endpoint Antivirus and install File security, then lock down ALL the settings with a master password. I think that may prevent restarts too.
  18. Hello, A Forensic imager . Cloud based backup setup prior to being lost from hosts like google, microsoft, samsung etc Remove the Nand IC and weld it to a rig for data dump and converting from raw. PM me if you need data recovery services, i can point you in a good direction if the severity of obtaining is high. US only. However this is completely unrelated to ESET LLC, or ESET and this security forum. You may post anything you want or like in a General Discussion thread, however it cannot be against the rules and terms of membership. The Rules
  19. What profile are you referring to ? Did you mean policy? I would keep a second one for macs called "MacPolicy"
×
×
  • Create New...