Jump to content

hawkunsh

Members
  • Posts

    9
  • Joined

  • Last visited

Posts posted by hawkunsh

  1. On 3/1/2019 at 8:10 PM, Marcos said:

    ESET Dynamic Threat Defense is disabled by default. It can be enabled through a policy, however, it requires clients to have EDTD activated, otherwise an error will be reported. Please make sure that EDTD is disabled in a policy as follows:

    image.png

    We've had EDTD enabled on all our servers for a long time. Suddenly we get this error for one (1) of them. And within 24 h the error disappeared, without me changing any settings. Actually, as I recall it, this error has occurred a couple of times before (last couple of months) and each time it has "solved itself" after some time or after a server reboot.

    To me this is not normal and can't be explained the way you suggest.

  2. FFS ESET! I've never heard about EDTD before and to the best of my knowledge we haven't payed for any separate EDTD licenses. We have a handful of servers (all configured in the same way in ESMC) and a handful of workstations. Suddenly one (1) of the servers is reporting this error. This one:

    image.png.34f237c15db418ee2d1041fd1bf4fca8.png

    C'mon, you can't just introduce a new error like this, display it for only one (1) of our X servers and expect us to understand what's going on. Do better!

     

  3. Same here. Get the error occasionally on two Win 10 computers, several times a day. It seems to depend on if, and what kind of updated content, is present at the time om the update, whether the error occurs or not. So a bit hard to reproduce in a controlled way.

    After the error occurs (auto update initiated) I can manually trigger updates 0 – ~6 times before the update finally succeeds.

    Both computers are recently updated to "Windows 10 Fall Creators Update" as opposed to several other Win 10 machines not getting this error. But we also have a third Win 10 machine updated to "Fall..." that as far as I know don't get this error, so...

    All these Win 10 machines runs latest Endpoint Security 6.6.2064.0.

    I have traced file access with Process Monitor during a failed update. I filtered the output like this:

    image.png.55c600ecd8c9de8c6b6e1dc3c999cde9.png

    The lines I've found interesting looks like this:

    image.thumb.png.5341ac74ad42dc01ed426281b8934071.png

    Unfortunately the Update engine advanced logging wasn't activated at the time, but I'll send you the collected logs anyway.

    You'll get the ELC and PML files mentioned in a PM.

    If you also need Update engine advanced logging, let me know.

    / Håkan

×
×
  • Create New...