Jump to content

Peter Randziak

ESET Moderators
  • Posts

    3,516
  • Joined

  • Last visited

  • Days Won

    207

Everything posted by Peter Randziak

  1. Hello guys, I may confirm that the distribution of v.16 started via the Auto-updates / uPCU on Tuesday for users with pre-release updates set Peter
  2. It affects the ESET PROTECT cloud so as you stated, you might not be able to log in, or see some errors after logging in and also the sync of data with the management agents might be affected. The ESET endpoints are protecting the systems, so the protection is in place.
  3. Hello guys / @NobelDwarf, we have an entry for such issues reported on the Status portal https://status.eset.com/incidents/6ytcjn9mf32h If you encounter the issue, please provide us with: Affected EPC instance ID(s) Exact time when the customer encountered the error (including time zone info) The error code received. You can send me a private message with the data. Peter
  4. Hello guys, we have an entry for such issues reported on the Status portal https://status.eset.com/incidents/6ytcjn9mf32h If you encounter the issue, please provide us with: Affected EPC instance ID(s) Exact time when the customer encountered the error (including time zone info) The error code received. You can send me a private message with the data. Peter
  5. Hello @1cue, I assume this will have to be checked by the devs. So either open a ticket with your local support or send me a private message with your EBA registration email and screenshot of the error. Peter
  6. Hello Jim / @Trooper, as of now it is compatible with the on-prem deployment only 😞 (the ESET Bridge management, cert distribution for https caching) It can be deployed as a stand-alone, not managed proxy for the current endpoints as well. Peter
  7. For anyone interested in trying ESET Bridge BETA (new solution for ESET traffic caching and forwarding), we have good news to share - we have just released it. To find out the details and take part, visit the dedicated BETA forum section at https://forum.eset.com/topic/33619-eset-bridge-beta-new-solution-for-eset-traffic-caching-and-forwarding/
  8. For anyone interested in trying ESET Bridge BETA (new solution for ESET traffic caching and forwarding), we have good news to share - we have just released it. To find out the details and take part, visit the dedicated BETA forum section at https://forum.eset.com/topic/33619-eset-bridge-beta-new-solution-for-eset-traffic-caching-and-forwarding/
  9. We are delighted to announce the launch of the ESET Bridge BETA program. ESET Bridge is a new solution for caching and forwarding traffic of ESET products heading to ESET's online services. ESET Bridge, built on NGINX, is a successor of the HTTP Proxy. To name some of the new features and improvements: Integration with ESET PROTECT which will allow users to manage ESET Bridge HTTPS traffic caching Certificates deployment via ESET PROTECT Watchdog functionality Crash dump functionality To test the mentioned features, it is required to deploy: ESET PROTECT BETA build ESET Bridge BETA build Endpoint 10 BETA build These installation binaries are available at https://forum.eset.com/files/category/9-eset-bridge-beta/ Supported OSes for ESET Bridge are Windows Server 2016/2019/2022 and Linux - Linux systems compatible with ESET PROTECT 9.1 Server component Detailed ESET Bridge help is available at https://help.eset.com/ebe/1/en-US/ As usually, by downloading and using the builds, you agree with our BETA program agreement, which is available at https://forum.eset.com/files/file/58-eset-beta-program-agreement/ To ask a question or report any issues, you encounter during the BETA just post a reply here. We are looking forward to your participation and feedback,Peter on behalf of the teams involved
  10. Hello @mathisbilgi The Apache based HTTP proxy will be completely replaced in the future ESET PROTECT releases. Stay tuned for BETA, which might appear in a foreseeable future... Peter
  11. Hello, check the Scheduler, by default Regular automatic update runs each hour. Also information on tasks' last run is shown there... There is also Automatic update after user logon task scheduled, which might explain it. Peter
  12. Hello @safety, which update server has the customer set? Does the offline license file contain the username and password? Can you send me the offline license file via a private message to check? Peter
  13. Hello, colleague tried to install and activate the v.9 and it worked. Anyway as the version 9 is already EoL ( https://support-eol.eset.com/en/policy_home/product_tables.html ), please use a supported version of ESET product to install and activate, ideally the latest one available at https://www.eset.com/int/download-home/ Peter
  14. Hello @tbsky, the old cert is being served by CDN, as of now it is not clear why. We are checking it and working on it. Thank you for reporting this to us. Peter
  15. Hello @tbsky, can you please provide exact URL you tried to access and also IP of the server? Peter
  16. Hello @st3fan, my colleague tried to reproduce the issue in a testing environment and the automatic upgrade did not happen, Can you please provide us (via a private message) output from the ESET Log Collector to check for the start? Peter
  17. AS you have a workaround already, I won't bother with downgrading the agent and wait for the fixed release... Peter
  18. Hello @eclipse79, I would recommend to post it to the "Future changes to ESET PROTECT Cloud" topic https://forum.eset.com/topic/25742-future-changes-to-eset-protect-cloud/ As far as I know it is monitored by the responsible people Peter
  19. You are welcome, pleasure is on our side. It seems that the management agent for macOS is affected too. Peter
  20. Hello @eclipse79, The SNI was not sent by the agent, which caused the behavior you reported. We already have a fix for it, new agent version will be probably released to address it. Peter (P_EP-26930)
  21. Hello @eclipse79, the development team confirmed a bug on our side. Thank you for reporting it and for really nice analysis on your side too. Peter
  22. Hello @eclipse79, I'm checking it with the dev team. Can you please provide us with the status.log and trace.log logs? If you can capture the connection attempt with a Wireshark, it might help too. You can send them to me via a private message. Peter
  23. I checked the detections on mentioned VT links and both files are subject of detection as of now...
  24. https://www.virusradar.com/en/glossary/downloader-trojan Downloader, Trojan-Downloader These terms usually signify malicious programs, components or functionality whose (usually sole) purpose is to download additional (usually malicious) software onto an infected system and execute it. See also: Dropper
×
×
  • Create New...