Jump to content

Mauricio Osorio

Members
  • Posts

    107
  • Joined

  • Last visited

Posts posted by Mauricio Osorio

  1. Hi guys!.

    We are about to implement ESET Inspect on 1000 computers, and I would like you to help me clear up some doubts before implementing: This was the result of the average events per day:
    image.thumb.png.ae783be7a70d67d3441ebe1ea420ae1f.png

    My doubt arises because the hardware requirements for the database are calculated, in this case, it will be MSSQL. These are my doubts:

    Should I take into account more RAM for the Windows Server operating system?

    Can I install the application (ei_server_nt64.msi) on the database server?

    If I can't install the application on the database server, what would be the minimum requirements for that new server?

    What other recommendations would you make?

    Thanks for your help.

  2. I have uninstalled ESET File Security for Linux, but it never fully uninstalls; remnants of folders and services always remain. How can I completely uninstall it? Is there an esetuninstaller for Linux? Now it appears in the console like this:
    image.png.5831515cb887abd9bddf8d55930f9152.png

      Tipo de sistema operativo
    Linux
      Versión de sistema operativo
    8.9
      Nombre del sistema operativo
    Rocky

    Can someone help me with this?

  3. Hi guys!.

    Problem Summary: The client reports that ESET Cloud Office Security (ECOS) has been allowing multiple phishing emails through despite being active. They request assistance in elevating detection levels to mitigate the associated risk.

    Client Description:

    The client has been receiving an increasing volume of phishing emails over the past few weeks.
    ECOS, which is set up with default settings, has not detected or blocked many of these emails.
    The client is concerned about the security risk this represents and desires a solution to elevate phishing detection.

    How can we elevetade or improve phishing detections?

    Thanks a lot.

  4. On 1/18/2023 at 4:34 PM, MartinK said:

    In case you are using GPO deployment method, i.e. distribution AGENT installer with configuration in install_config.ini file, simplest would be to modify install_config.ini by adding PASSWORD=... as visible in referenced KB6745. I guess you already modified this configuration file with new IP address or hostname.

    Also note that if AGENTs are configured to connect IP address or new hostname, certificate of ESEET PROTECT Server service has to be adapted for this if it was not previously (especially in case certificate is not using wildcard host which is not default). Otherwise AGENTs will be rejecting connection as they will consider it as an unsecure. IF this is the case, you will have to follow one of the migration scenarios - most probably this one: https://help.eset.com/protect_install/80/en-US/?migrated_database_same_ip.html. In the most optimistic scenario, creation and application of new ESET PROTECT Server certificate with proper configuration should resolve this - especially in case the same certificate authority will be used to create new certificate.

    We are trying to implement the solution you give us. I will be informing you of the result.

    Thanks.

    BTW: local support says there is no solution other than manual deployment.

  5. The client made an arbitrary IP change without changing the routing of the agents and now cannot return the old IP.
    Is it possible to carry out a solution that allows the change of the IP in the agents in a massive way?
    It should be noted that the agents were password protected and when performing a GPO installation the addressing does not change, apparently for this reason.
    How can I help this client?

  6. A few days ago we managed to get one of our clients to change their protection product to ESET's. But we haven't been able to effectively detect spam and phishing in your emails. Is there any recommendation or good practice that you can recommend us?

    The client tells us that with his previous product the user had at his disposal a button to report phishing or spam, something that is very useful for users. I don't think ECOS has this option, but how can I get it to better detect phishing and spam?

×
×
  • Create New...