Jump to content


  • Content Count

  • Joined

  • Last visited

Everything posted by whitelistCMD

  1. Thank you for your reply, Michal. I appreciate the info. I'll respond if issue cannot be resolved or if things do not change after the 7.1 update.
  2. Hello, I'm currently running ESMC 7.0.471.0 and I have two mapped domain security groups that I use in order to apply different permission sets dependent upon the persons role. The current two groups are eset admins and eset users. I have one employee who currently exists in the users group. I'm now trying to give him admin permissions. I have removed him from our eset users group in AD, and then added him to the eset admins group. I then ran users sync task in ESMC, to make sure it had the current groups (I didn't know if this step should be involved or not? since I'm looking for AD Grou
  3. Hello All, After the recent MacOS update and ESET Cyber Security Pro update (I upgraded both on the same day), I am getting notifications from eset that it has detected a new network connection; utun1 interface. I then get a notification "Waiting for DHCP Response" with a 60 second timer. I don't use any VPN software; it's a MacBook Air 2014. Any idea what might be causing this sudden change in behavior? I was able to find this link from Apple: https://discussions.apple.com/thread/8456250 Any help or insight into this is appreciated. I have since upgraded another MacBook Air with ESET
  4. I just went ahead and started putting our exclusions in this list, however, this won't work for us. I need to be able to exclude certain file types from scanning (yes, I know there should not be exclusions, but it impacts the performance on a couple of machines when certain file types are being scanned, and I was overruled on this decision). The problem with exclusions of certain file types is I may not know the path, and the servers may have different drive letters. If I can't Replace or Append the file extensions list, then I can't have more than one list if a server is picking up more than
  5. Hello, I have a question that pertains to File Exclusions under RTFSP.... If we have multiple policies stacked on top of one another for a specific server, and those policies both carry File Exclusions under RTFSP, how are we able to stack those exclusions? I do not see the option to append, pre-pend, or replace? I do see the option for File Exclusions under Detection Engine, but it is non-existent for File Exclusions under RTFSP? Do only the exclusions under the last policy applied, get excluded from RTFSP? Thanks in advance!
  6. Ok, thank you for the clarification. I'll wait a little bit to see if that changes at all. I'm currently working on upgrading all of the applications anyways. Thanks again.
  7. By manually upgrading, I meant migration. My apologies for the confusion and the delay. I was just curious if it was possible to upgrade without re-deploying a new appliance, Thank you for your help. I appreciate it as always.
  8. Thank you Michal. I appreciate the clarification. It makes sense. We are not currently using a proxy, but I see the concern either way. I will wait a bit and see what develops on your side, then consider our options. Thanks again.
  9. To clarify, I did not lose control of some users after an update to version 7. It started when some machines went out for a module update. It was more of repo connection from one side or the other. This all started before I upgraded anything to version 7. I have had 0 issues with any version 7 product thus far.
  10. Thank you, Michal! I appreciate it! To confirm, once we upgrade to ESMC v7, I would then just run the Remote Components Upgrade task from the ESMC v7 console on the Endpoints and that will bring the agents up to the current version?
  11. I'm actually having issues with Web Control ever since some endpoints decided to stop reading user data once they received a module update. I can only control and modify about half of our users, even though all the endpoints have no issues receiving the updated policy. When I upgrade them to Endpoint Security v7, everything works again. This is why I'm asking if this is ok. I'm only targeting specific users right now, but I would like to speed up the process since we will be upgrading ERAv6.5 to ESMC v7 at some point.
  12. Hello, Can I begin upgrading Endpoints to v7 that will still have 6.5 agent and connecting to an OVA ERAv6.5? Mainly running Endpoint Security and File Security. Thanks!
  13. What is the exact process for manually upgrading OVA ERA 6.5 to ESMC v7? Is there any prep work I need to do on endpoints before or after the update so that I can begin upgrading those endpoints to v7?
  14. Hello ESET Team, Any idea when the Remote Administrator Component Upgrade Task will become available for upgrading ERA v6.5 to ESMC v7? I know the manual upgrade is available, but with a project heavy workload, I'm looking for the easy win to get us on the new platform. Any information will be helpful. Thanks in advance!
  15. I'm having this exact same issue. I noticed we had a bunch of machines have their signature downloads interrupted last week, but that seems to have cleared. However, when trying to download the AIO installer, I'm running into the exact same problem. I've confirmed that nothing on our side is blocking communication. I get the Internal Server Error after five minutes. I tried combing through the trace log, but with debug verbosity it's incredibly hard to find. I did find one stating error during file get request standard exception, but I eventually stopped combing through everything. I'm located
  16. Perfect. Thank you very much, sir! I appreciate it as always. Take care!
  17. Thanks, Marcos. So this support is enabled by default and is not something I need to turn on then, correct?
  18. Forgive me if I missed this in a previous version, but has support been added for WSL in Windows 10? We're currently running windows 10 with the latest version of ESET Endpoint Security (6.6.2072.4) and I thought I remember seeing an option in ERA when viewing the policy for these machines, to turn on support for WSL, but after revisiting this I'm not seeing anything in the policy. Can anyone tell me if this is done by default, option-enabled through policy, or is it even supported? I just want to make sure we're covering ourselves and I'm not missing something. Any info on WSL and EES is appr
  19. ERA Virtual Appliance ESET Remote Administrator Server 6.5.417.0 We're currently moving to TLS 1.2 only, on a large number of our servers. The few Windows Servers (Server 2012R2, and 2016) that have already been migrated over to TLS 1.2 only, have since lost connection to the ERA. I looked to see which ciphers the agents on those servers are using, and even though they are TLS 1.2 ciphers, they are considered weak, which would burn us in an audit. I'd like to turn on "Advanced Security" in ERA Server Settings to hopefully have access to higher cipher suites, but I'm curious of
  20. Do you know if it is necessary to keep the xml config file after successful import, or can it be deleted? I'm not sure whether or not CSP is just pointed to config location, and I have yet to dig to try and find it. Thanks again.
  21. Perfect. That's exactly what I was looking for. Thank you for the help.
  22. Hello, ## 2 MacBook Airs running High Sierra 10.3.2 and both running ESET CSP 6.5.600.1 # 1 MacBook Air upgraded to ESET CSP 6.5.600.2 before Mac OS High Sierra 10.3.3 update Everything seems to be working fine on this one, but CSP did take approximately 10+ minutes to write files, which seemed lengthy (not a complaint, just wanted to relay any info I can). # 1 MacBook Air was NOT upgraded to ESET CSP 6.5.600.2 before Mac OS High Sierra 10.3.3 update I quickly installed ESET CSP 6.5.600.2 immediately after the Mac OS 10.3.3 update and then I received a
  23. Hello, ERA OVA version 6.5.417.0 We currently use ESET Web Control for Web Filtering. We've been adding each individual user manually, but we're trying to move away from that and just use group SIDS. The rules are already in place and we've had no issues with blocking. If I add the group SID for Domain Users to our default category block rule, I can then remove the users individual SID who belongs to Domain Users group, and ESET Web Control is still blocking as it should. However, if I add the group SID for Domain Admins to the same default category block rule and remove an indi
  24. I got it. I was getting confused with all combinations I had tried earlier, and for some reason I thought your post said ".ru/*" and not "*.ru/*" Anyways, sorry for the back and forth and thanks for the help.
  25. Disregard. I have it working for the specific domain now. It was a typo; of course. Just to clarify, do I have to have the TLD name, or can it be any domain ending in .ru, etc?
  • Create New...