Jump to content

Sportif

Members
  • Posts

    3
  • Joined

  • Last visited

About Sportif

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    USA
  1. That was done before this post. I am hoping for a positive outcome. Either way... A semi-templated approach / reply does not provide a response to my question. Not every customer posting on the forum is a novice that needs to be addressed as though they just discovered the internet and it's possible dangers. Does ESET offer a product that is more granular in it's handling of web filtering? I particularly do not care if it's home or enterprise class. People will pay for what they value. This is a feature I and more people that I have recommended would value. This is a simple "Yes. You missed it. Look at (insert product name). OR "No. This is our established measure for the safety of our clients." That is not happening. This was the expected behavior when the site was added. IS is ignoring the exception even though it is on the allowed list.
  2. Ok. Let me start off by saying that I prefer ESET to all other AV solutions. I nor anyone I have ever recommended the products to have had and "Oh no!! I have a virus / malware / adware / etc. etc." moment. I typically refer IS but have encouraged more problem prone users to get SSP. Now here is where I have been having problems. ESET home products take a sledgehammer approach to web filtering. It's gotten to the point where I have to disable filtering altogether to load sites and research the actual cause of the block on a weekly basis. This covers my personal use as well as people who contact me that I referred to ESET. I would like to know if ESET offers a solution that has granular controls for web filtering? I have searched and overlooked OR it simply is beyond what is offered for a home solution. I ended a VNC session with a client this morning who was embarrassed to have me help him access a particular site that ESET IS blocks even though he was knowledgeable enough to all it to the allow list. The site itself is not malicious. He’s been using it for a couple of years and never had a problem. The issue is the CDN and monetization 3rd party sites used by the web admin (note the owner of the site didn’t know until he got an email from me advising him to review the site and hint at why revenue is likely down). ESET detects the JS from those 3rd party sites and does a blanket denial for the requested domain. I need a solution that is more granular in its approach to web filtering if I am to continue directing people to ESET. Let’s say google.com decided to inject JS from a 3rd party that ESET flags (contains potentially dangerous content). What I am looking for is a solution that will still allow google.com to load while terminating the JS from badcdn.com / crapmonetizationscripter.com if google.com is added to the allowed URL list. Or simply have the behavior by default. Malwarebytes does this and I consider ESET to be a superior product. It will allow the requested domain to load if the domain itself is not flagged then simply blocks the injected JS being pushed from a 3rd party server / service. Seriously… to have to disable ESET to load a site just to dissect it to discover the issue is rooted by a crappy 3rd party provider that may or may not actually be malicious is ridiculous. I’m having to do this more and more lately in my clients and in my personal use. Does ESET have a product that offers the great protection that lead me to start pushing people to you that also includes better (i.e. granular) approach to web filtering? Note… this is only a concern with web filtering. Everything else is great.
  3. Hello, I've been using dropapk for a long time now. EIS started flagging urls on the site. Visting dropapk.com doesn't trigger the block. It only happens when visting a url that leads to a hosted file. I uploaded a simple text file with the word "test" in it @ hXXps://dropapk.com/c7lzyzapxkzz. EIS blocks it with the threat notice. Can someone take a look when there is time? Thank you.
×
×
  • Create New...