Jump to content

beethoven

Members
  • Posts

    75
  • Joined

  • Last visited

About beethoven

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Please select

Recent Profile Visitors

1,158 profile views
  1. In case someone else is interested, it seems "Unfortunately, there is no way to cancel or stop a running task. It will timeout at some point if the execution was interrupted in a way that a response was not possible (for example, a system restart)." A bit disappointing as in this case the status as shown in the task will often show something as running when in fact the scan was aborted midway and is no longer active.
  2. A pc linked to our cloud network has not been turned on for a while as it was not used. It now requires some modifications but upon startup a scan initiated. This apart from the usual updates makes the pc quite unresponsive. What is the best way to stop a running scan? I tried to run a command to pause protection (ecmd /setfeature onaccess pause) but this probably only becomes relevant after the scan is finished. I can't seem to find a command to abort a scan remotely?
  3. using eset internet security 14.2.24.0 on Win10/64bit This morning when trying to access our own website I am getting the above error message but only on my own pc. Other pc being connected to the same site using Endpoint security 8.1 via a managed cloud setup are having no issues. Looking at the details it appears that for reasons unclear on my pc the certification path for Eset SSL Filter CA is shown as something.domain.com.au . The certificate is issued correctly and shown in the cloud based protected pc as www.domain.com.au The incorrect path is a legacy server that we run for email only but should not be used for website checking. This worked fine until this morning and I have no idea how to reset the certification path. I did clear the cache last night after having done testing on the website in question wanting to ensure that what I am seeing is fresh and not cached. If Eset on my pc is now looking for an incorrect certificate (this certificate has expired or is not yet valid) how can I reset this to look for the correct path?
  4. thank you Marcos, it's working again. Of course that console ID is only available if you are able to connect or login, I now copied this to have this available in future if I run into a similar situation.
  5. Is there any new / current issue today? I have seen the above tools earlier and now I am getting Something went wrong message?
  6. Thank you Martin - I found this myself just after posting the query but was not able to delete the post, so I just edited it instead. I have not made use of the Dashboard/Eset Application info - thanks for pointing this out.
  7. Marcos, thank you but I think you may have misunderstood. I realise that the above caused Eset to take action but I do not think that my colleague went to this website intentionally. According to him he went to a car site and googling adnxs it seems that Adnxs.com is part of an advertising service that website publishers can use to generate revenue on their sites. Unfortunately, there are malicious programs that are redirecting users to these Adnxs.com ads without the permission of the publisher in order to generate revenue. I think it would be useful to know which website may have been compromised or just used this service so that if I see the same alert coming through for the same staff member several times whether this relates to the same site. In that case I would ask him not to access this site from our pc. I don't care if he uses his home pc.
  8. Using ESET PROTECT Cloud (version: 2.3.5.1) - a few times now I have been alerted via the cloud console about Eset terminating a script scanner (see screenshot) . Staff are aware to be careful as to which sites to access, so I am a bit frustrated that this seems to happen for one particular user. From the alert I can see that it was handled by Eset and that it was a chrome / website use but is there any way to see which webaddress "served" the malware. If this happened on a legit site that the user needs to access, I would feel better than thinking he he keeps surfing to sites that have nothing to do with work. The Object URI does not tell me much - it might be an add ?
  9. Using Cloud 2.3.5.1 and wonder how to easily check which workstations need to be updated with respect to the security agent or the management agent. At the moment I need to check each station individually via "show details" but assume there must be an easier way. I realise that I can see the version under computers overview but this does not provide info on the management agent. I also see that there is a pre-configured option to show computers with outdated modules though this does not show anything for me even though some pc need updating. edit: Just found the answer in Overview / Status
  10. Sorry Marcos, my terminology is probably wrong - please see attached screenshot. It has been set up via policy to run at startup and where most pc scan quickly, this one takes several hours each time. I suspect this is due to the split partition and the images on the second partition which I don't need to have scanned.
  11. On Eset Protect Cloud most of the workstations are automatically scanned on startup / balanced and this is fine with me. One workstation however has two partitions on the boot drive , the "active" OS and a second partition having some images stored. ( I realise that if this drive gets corrupted the data is gone too) . The startup scan is taking ages because after finishing the usual scan on the c: drive the scan moves to the other partition. Is there any way to restrict the scanning to the c: drive?
  12. Michalj, thanks for that - that worked well for me in testing. Marcos, how would I set up a preventative policy for locking default real-time and Hips? If I did so, would I still be able to use the command as described by Michalj?
  13. Michalj and Marcos, thanks for that. I will need to study this, to see whether this is within my abilities. I had hoped there was a way to select the workstation within the cloud console and rightclick disable or similar or perhaps run a task to disable protection. Can you please also confirm that my understanding is correct that at the workstation you cannot disable protection?
  14. Sorry Marcos, I had intended to post this under the Eset Protect Cloud Forum and somehow ended up in this forum, Perhaps you can move it . We are using Cloud Protection with 25 pc and I am monitoring these via the Administrator Function. What I am looking for is a way to temporarily suspend Eset on a specific workstation. In this particular case the colleague tried to install some legit software and the installation failed several times. While I could not see any indication that Eset had interfered or quarantined from the console, we wanted to rule out that the failure was due to the AV. I posted the relevant software numbers being used in my original post. Normally in a stand-alone AV you can rightclick the icon and temporarily suspend the protection, until reboot or for a number of minutes. It seemed to me that this was not possible on the workstation and I suspect that this is intended to prevent "anyone" to do this, so I was hoping to do this as administrator from my console. How? As mentioned I thought perhaps "deactivate the product" for this workstation in the console would be the way, but I can't see any effect. Obviously I would need to know what I deactivated and how to reverse this as our testing is over.
  15. I am not sure what the best procedure is to disable temporarily protection on a workstation controlled via the cloud? If this is not possible, can this be disable locally by the user? It seems to me that locally the options are greyed out. Using Endpoint Sec 7.3.2044 and ESET PROTECT Cloud (version: 2.1.24.0 and ESET Management Agent 8.0.1238.0 I clicked on deactivate the product in the console but I cannot see what this did or how I would revert this now?
×
×
  • Create New...