Jump to content


  • Content Count

  • Joined

  • Last visited

  • Days Won


speakerbox last won the day on January 8

speakerbox had the most liked content!

Profile Information

  • Location
  1. Bumping thread as no response, would really appreciate some rough guidance so we know where we stand - can see a few others in the same predicament.
  2. Hi, We're currently reviewing our server protection, we have around 150 on a mix of ESET File Security 7.0 and 7.1 (Windows only) which according to the EOL page is in support (Limited for 7.0, Full for 7.1). With ESET Endpoint AV V8 being released for clients is there any rough estimated date/quarter/year on when the next major version for File Security will be released? I've noticed 7.3 released for ESET File Security last month (EOL page not updated to show that?) but we're reviewing whether we should upgrade all our 7.0/7.1 servers to 7.3 or wait for V8. It be months of wor
  3. Hi, We're having some trouble removing an old XP agent that was retired but recently checked back into our ESMC console (V7). We have no physical access or remote access to the machine other than what we can do via the ESMC console. When we use the "Stop Managing" task, this fails (Task failed, try to uninstall software manually.) so the agent contionues checking in. I've tried via the "Software Uninstall" button via installed application but this fails with the same error. Is there anything we can do to stop this old retired agent from checking into our ESMC console? Thank
  4. Sorry that was just a random URL, we've been using various URLS. For example: https://gallery.technet.microsoft.com/Turn-off-screen-4d173e0a/file/147696/1/Turn off Screen.bat I think I’ve manged to identify the problem however, completely bizarre but on my test PC – the HTTPS URL was only blocked after I cleared cache and cookies in Edge (I done this after testing InPrivate browsing which worked and blocked immediately). So I think ESET or Edge must have cached my test URL’s (Which I visited before adding the URL blocks) in some form and the act of clearing cache in edge
  5. Yeah have also tried that, I don't think it's relating to the extensions i've added - it doesn't seem to intercept HTTPS traffic at all. Again, fine with HTTP.
  6. Yes that doesn't work i'm afraid. Still works fine if the link starts with HTTP and ends in bat but if it starts with HTTPS and ends in bat it doesn't do anything an allows the downloads.
  7. Yes the link we're testing ends in bat: hxxp://www.cyberessentials.guru/guest/testfiles/hello2.bat This is where we see the problem between http which blocks fine and https which only blocks in IE which is strange. On the same browser on the pc if we change the above link to https it doesn't block on chrome or Edge.
  8. Hi, We've applied a policy setting to block batch files from being downloaded using URL address management. Policy set as per: https://help.eset.com/eea/7/en-US/idh_config_epfw_scan_http_address_list.html I've added "*/*.bat" to list of blocked addresses. Now this seems to work fine on all browsers when the URL is HTTP but if the URL is HTTPS, it only seems to be blocked/working on IE. Chrome and Edge at least are not blocked and the user is able to browse the link ending .bat. SSL/TLS protocol filtering is enabled. Any idea why HTTPS URL blocking doesn't appear t
  9. These are for ports on the clients firewall (we don't manage) that are open eg 443 & 80 to internal resources that have ESET AV installed. We've spent a year+ advising them they need to close the ports or at least lock down via IP/country but refuse to do so. We've advised we will no longer monitor for network vulneralities on these specific PC's and had sign off from the client despite the risks they've agreed to. We have the default network vulnerabilty notification setup to email our support team, we would like to have it NOT email for these specific PC's so if PC00001 detects this
  10. Hi We get hundreds of alerts for one of our clients, who despite us bombarding them advising they need to geo-lock or close the port to a specific PC, they've refused to do so. We now have sign off from the directors of said company to no longer monitor the specific PC's and happy for us to exclude the PC from the "Network Vulnerability Alert" notification. Looking at this I can't see any easy way other than using the target IP address of the machines in question to exclude, you can't seem to exclude a specific agen using hostnamet? Are you aware of any way to do this, we could use
  11. Hi, Most of our clients are using ESET V7.2 and with the Windows 10 update warning we will now need to push out the 7.3 update ASAP to 1700+ clients. https://support-eol.eset.com/en/trending_win_10.html We've started receiving some calls and emails from our clients concerned about this message. Are you able to confirm the default behaviour of this warning? I.e Does it visibily open forcing the user to read and close the message/ESET window or will the user only see this if they manually open the ESET Endpooint AV client? On my own personal machine, i've not had it visibily
  12. Hi Marcos, Will ESET Endpoint Anti-Virus version 8 be out any time soon? We are about to update 1000+ 7.2 clients to 7.3 to support the latest changes and stop our users calling us every minute about the warning but if V8 is around the corner should we hold off spending days rolling out 7.3 updates only to do it all again for V8? Cheers
  13. We are getting lots of these alerts for various NAT rules we have. RD Web (443 internally) and SFTP (22 internally) - we use obscure ports externally but these still get hit. It's not entirely clear what Botnet.C&C.Generic is? Is this a known list of IP's that ESET blacklists or known list of specific botnets bundled into the "Generic" tag/list? Can we have access to this list for blocking? It would be good to have more information here so we can make an informed decision on what do at our perimeter firewall? We can't close these ports externally but can secure ports based on thi
  • Create New...