Jump to content

planet

Most Valued Members
  • Posts

    560
  • Joined

  • Last visited

  • Days Won

    30

Posts posted by planet

  1. Hi tmrd,

     

    It's likely that you have Mac OS X's built in Firewall enabled, which ESET recommends you disable.

     

    Clicking on that text will open the relevant window for you to turn it off so only one Firewall is running (which is ESET's).

     

    You can also do it manually by clicking on the Apple logo on the top left of the screen, then 'System Preferences...', 'Security & Privacy', the 'Firewall' tab, and clicking 'Turn Off Firewall'. If the button is greyed out, click on the lock on the bottom left of the window and enter an Administrator's username and password to be able to click on it. Restart (or log off and on again) for ESET to recognise the changes that you've made and you should be done.

     

    If the message continues to appear or the build in OS X Firewall is already disabled, you may have another third party firewall installed. 

  2. Not having the absolute latest virus signature definitions is not the end of the planet.

     

    Phew!  ;)

     

    Thanks for providing a solution regarding this update issue - I noticed the database installed is still from a few days ago even after manual updates, but I'll flush the update cache and simply wait.

  3. [...]even hxxp://www.pro1.com.au/) is maybe a reseller or a fake website (because I don't want to promise it).

     

    It is definitely a reseller - it was pretty much the only main reseller Australia had - ESET used to link all customers to them on the ESET Australia website until a few months ago when they started using their own store... so try out the main ESET Australia Store, and if you have trouble purchasing on there then Pro1 would be the second place to go to purchase ESET products.

  4. G'day HappyFeet!

     

    The Aussie ESET website used to redirect customers who clicked on 'Store' to an external "Pro1 ESET Elite Partner" store, but recently ESET seems to have added their own store within the ESET website (Which by the way isn't working properly, adding something to the cart results in a blank page where the iFrame of the shopping basket should be).
     
    If the URL as @rugk pointed out does begin with hxxp://www.eset.com/au/ or hxxp://au.store.eset.com, then that is the genuine Australian ESET website.
     
    @Marcos's link seems to be from the same or a different Australian reseller (quote: "exclusive reseller of ESET products in Australia."), not the official ESET website even though it uses the eset.com.au, nod32.com.au and antivirus.com.au domains... :huh:

     

    It's a little confusing at the moment for Australians of how and where to purchase ESET products. :wacko:

  5. I see now and reproduced the issue too. I've been under the impression that the size is saved upon exit, however, it seems this functionality was removed or not functioning in v6+. I've asked engineers if this is expected behavior or if it should be reported as a bug.

     

    Could this also be considered or looked into for Cyber Security (and Pro) as well? Changing the window size and restarting the Mac causes the window to go back to default.

  6. Our overall goal here is to be able to generate a report on multiple machines to see what viruses are being detected on each of them, but not having to parse a system.log file that would rotate every day (which is still doable, but...)

     

    We had hoped we could block of the logging to system.log and read the logs that the *application* is still displaying, but it seems not...

     

    That makes sense. I wonder if ESET NOD32 Antivirus Business Edition for Mac OS X with ESET Remote Administrator could provide this for you?

    I'll definitely need to allow someone from ESET or another user respond to this topic now, as it's something I'm not familiar with.

  7. Yeah, those are not world-readable, unfortunately.   I'm sure those are the files, though...

     

    We'd probably have to filter against the system.log file...

     

    If you're needing to just clear out the system.log file, the solution posted in the topic you linked earlier does do the trick and you can just leave the built-in logs as is?

     

    Edit: I noticed the timestamps change for threatlog.dat after downloading "eicar.com".

     

    After further testing we found that we needed to use syslog_facility=none not syslog_class=none to disable all ESET logging to the system.log file. Please ensure the previous syslog_class option is commented out or removed from the esets.cfg file. You can do this by running the following command:

     

    sudo /Applications/ESET\ Cyber\ Security.app/Contents/MacOS/esets_set --section global --set syslog_class

     

    After that please run the command below to add syslog_facility=none to the global section of the esets.cfg file:

     

    sudo /Applications/ESET\ Cyber\ Security.app/Contents/MacOS/esets_set --section global --set syslog_facility=none

     

    Once completed restart your computer and check to ensure no more ESET log entries are showing up in the system.log file.

  8. Which is the specific log file that correlates with what is visible in Tools --> Log Files, though?

     

    So in Tools > Log Files, there's different logs to select from.

    This is only my assumption:

     

    section within program = file name

    Detected threats = threatlog.dat

    Events = eventlog.dat

    Computer scan = (?)*

    Parental = parentlog.dat

    Firewall = firewalllog.dat

     

    * In terms of 'computer scan', it would be one or more of the remaining files within the folder that hasn't been mentioned yet.

    Perhaps someone else might be able to let you know specifically, as I'm only a regular user of the program.

  9. Hey Arkwoman23, great to see you considering ESET.   :)

     

    ESET Smart Security is one of those security solutions where you can install it, activate your license, and feel assured that you are being protected. As the others have said, you are also able to configure advanced settings with much flexibility as well. It's not intrusive, runs really well and does a wonderful job protecting you in a wide variety of areas and situations, like with each usb drive plugged in, surfing the web in your preferred Internet browser, scanning your email, etc.

     

    Feel free to download and activate a trial on your computer to see it in action.

  10. You Eset mods remind of Comodo mods. Brain washed into think Eset is the best thing since Mom's apple pie. And closed minded to new ideas. Again I will stress that if 10 other antivirus companies can make a browser add on successfully so can Eset.

     

    Who knows, maybe in the future ESET may provide a Chrome/Firefox/IE browser add on/extension similar to WOT for Smart Security when they feel like it is necessary.

    For now at least, the idea has now been mentioned and quite well discussed.  :)

  11. One of the main reasons I went to ESET was their superb protection with their efficient software. After trying the majority of competitors, I found that year after year they begun adding more and more 'features' that felt a little unnecessary. So I will more than likely stay with ESET for a long time, as protection and security are the most important things I look for in a security solution, not the extras.

     

    Reading recent posts, I can see why a browser plugin or extension would be something that people want, but I already know that Smart Security already protects me with phishing, infected websites, bad downloads, etc. Then there is Parental Control, which also has the ability to block a wide range of categories (eg. I block 'Security & Malware' which includes 'Spam URLs, Parked & For Sale Domains, etc.).

     

    So if I do visit any website, I'm protected both on my machine and in the browser, even if I don't see a coloured icon telling me if a site is 'safe' or not, or an ESET logo sitting next to the address bar.

  12. @nolajo: As far as I know there is no more "advanced menu settings". IMAPS and POP3S are not available, hence this topic. You might be able to add HTTPS port 443 to the list of ports watched, but I'm not sure whether this will work.

     

    You're correct, at the moment there is no IMAPS or POP3S protection available for Cyber Security (and Pro).

    Unfortunately adding the ports to the lists do not work.

     

    This would be one of the main features that I personally would love to be added to Cyber Security (and Pro), along with HTTPS scanning (which will improve both Web Protection & Parental Controls).

     

    I would encourage users to post any other ideas and feedback regarding Cyber Security (and Pro) in this pinned topic so we can create a similar process like the one available in the Smart Security forum section.

  13. Hello Kielty,

     

    The firewall has a Back To My Mac rule on all "Home, Work & Public", which by default allows communication for it (specifically UDP for all addresses on Remote port 5678). So to answer your question, selecting it as public will not block Back to My Mac.

     

    This uton0 interface is for VPN connections, and it seems that Back to My Mac also uses this same interface.

     

    I don't know if it's safe and secure to use the same profile for this interface (eg. using "Home" for Ethernet, and if uton0 is also okay for "Home"), so below I have something that makes the uton0 interface only accept Back to My Mac communication (as well as other defaults required for basic network connection).

     

    Someone else (including ESET) may provide the answer that doesn't require the below steps, but it's just a temporary solution that I would personally do until a solid response is made. Alternatively, you could turn off "Back to My Mac" until a response is made.

     

    -----

     

    You could create a new profile dedicated for the Back to My Mac (or utun0) until ESET provides a solution or KB Article in the future for this. I should note that this may not work.

     

    1. Click the Cyber Security Pro icon on the menu bar of your Mac (top right) and click 'Preferences'
    2. Click "Firewall" and click on the "Profiles" tab
    3. Select a profile on the left that hasn't been used or doesn't have any custom rules (or just select any one), set the new profile name as "For uton0 and Back to My Mac" and click "Clone".
    4. Click on the "Rules" tab and change to the profile you just created, next to "Display rules used in profile:".
    5. Uncheck all rules in the list, except for "Deny AirPort Base Station discovery", "Allow DHCP communication", "Allow time synchronisation", "Allow BackToMyMac communication", "Allow DNS communication", "Allow all encapsulated traffic", "Allow ICMP Ping" and "Allow IGMP Communication". (I'm just being careful for these in case the uton0 interface still needs to use these, along with the Back To My Mac rule)
    6. Click on the "Zones" tab and delete any zones already made for the uton0 interface.
    7. Click "Add..." and name it "Zone for uton0 and Back to My Mac". Set the profile to the one we created ("For uton0 and Back to My Mac") and under 'Activator:', select "Interface" and then under the second selection box, select the one that shows either with the words VPN, uton0, Back to My Mac (Because I don't use Back to My Mac, I don't know what the actual one is)
    8. Click on 'Add', and then press OK.

    Hopefully this provides you with some security whilst still allowing Back to My Mac to work - give Back to My Mac a go to see if it does work.

  14. Running the application from the applications folder does not open the GUI as it's made to run at start up (which begins all the processes [filtering, protection, etc.], makes the icon appear in the menu bar and run the splash screen). This is evident if you look into System Preferences > Users & Groups > (select any user) > 'Login Items'.

     

    Think of it like a car key - it turns on the car for the engine to start, and once it's on, you don't try to turn the key again as it's already on.

     

    The best practice and main method to access the GUI is to simply click on the ESET icon on the menu bar (top right of Mac) which should be always running from login, eliminating the need to open the Cyber Security GUI from the Applications folder.

     

    Showing Cyber Security on the dock is an optional setting that is not enabled by default, and is rarely needed as the program already sits on the menu bar.

  15. Hi George,

     

    The logging is useful for when an issue occurs for ESET to diagnose, especially if they can't reproduce the issue themselves. By default, the logs are removed after 90 days by default, are optimised by default, and you can also select filters to hide particular types of records (eg. Critical, Warnings, Errors, etc.). You can change these three things by visiting the preferences window, then clicking on "Log files".

     

    The 'manual fix' is useful if you don't wish to record anything at all, but it does mean that it might be difficult for diagnostics or resolving malware issues, etc.

     

    With Yosemite, I've seen testers successfully run Cyber Security on the Yosemite beta, however with most software it should be officially supported by or shortly after the stable release date of OS X Yosemite in the future.

     

    Update: ESET Cyber Security Pro is now fully compatible with Yosemite.

  16. Hi dbaps,

     

    For your 'resets on disk', try out the most recent release (6.0.13.0) that should resolve the Kernel Panics.

     

    You can reduce the amount of scans performed by opening the program, clicking 'Tools > Scheduler', and unchecking the two entries with "User login" under the 'Launch time' column, then consider editing the "Startup file check" task (the remaining selected one, not the one you just unchecked) so the minimum task interval is set to 1 day (scanning your computer once a day) instead of every single time the database is updated, or to whatever you wish to set (eg. per week).

     

    In the Console log, ESET by default logs every new or modified file discovered, but it can be disabled if you prefer not to see them.

     

    It might be useful to see if adding exclusions for Google Music Manager (for example the 'ServerDatabase.db-journal' item) helps or not.

×
×
  • Create New...