Jump to content

BaldNerd

Members
  • Content Count

    34
  • Joined

  • Last visited

Everything posted by BaldNerd

  1. @samzike I appreciate your desire to solicit legitimate user feedback from the ESET community. Even if you're able to receive such commentary, you'd be opening quite a can of worms: ESET products span everything from the single-device home account to many hundreds of thousands of computers running central management and EDR. I think, therefore, it would be best for you to try to determine who the target audience for your review will be (ie. is it someone with 2 computers and an Android phone? Or is it a business with 100 computers and a few servers?), and be a little more specific in what
  2. Glad I could help @Nkosinathis Robbie // The Bald Nerd
  3. Description: Ability to update PFX associated with MDC policy programmatically rather than through web interface. Detail: We have MDC using a Let's Encrypt signed cert. These certs get auto-generated every 90 days via a cronjob. Currently, while the cert itself (a PKCS#12 PFX file) gets created successfully on schedule, I must manually edit the MDC policy within the ESMC web console to upload the new PFX to the policy. I would like to be able to instead import the new PFX file directly to the policy, possibly by way of a Linux command line tool whose command I can include within the Let's
  4. https://ela.eset.com - enter your license key at the top left to administer the license. Robbie // The Bald Nerd
  5. Yeah, ESET doesn't make it easy: that's why I suggested a phone call rather than a Google search I don't personally deal with box versions since the download version is always more current (as far as the installer goes). Just have to be sure, regardless of the version, that you're dealing with a legitimate ESET partner. Like that nerdy bald guy on the left. Haha! Robbie // The Bald Nerd
  6. Oh, I see. So you issued your own trial or something and attempted a deploy without installation support services? I'd highly suggest that you consult ESET Support for EEI. It is not intended to be self-installed. That is why when selling it, you must include ESET installation support services and priority support in the sale. Speak with your regional sales manager for more info. Robbie // The Bald Nerd
  7. @Fenway I believe what you are describing is that the retailer you purchased it from is listed as the ESET Partner for your license profile, and you want to separate yourself from them. Short answer: If you renew through a different partner, the profile gets updated in kind. Renewing through ESET directly does not necessarily make this change, though at least then the "shady" retailer doesn't get your money again. To alleviate some of your concerns, while it does appear the retailer may have pushed you to purchase some extras, both MalwareBytes Premium and SuperAntiSpyware play nicel
  8. I would suggest contacting the ESET support rep who assisted with the EEI deployment. You cannot simply change your IP address on an EEI server and hope for it to work without a lot of reconfiguring. A lot goes into setting up an EEI infrastructure. Robbie // The Bald Nerd
  9. @Lightning As @itman pointed out, there's no such thing as what you're explaining That said, if you indeed have an ESET product installed and need to remove it but cannot go about removing it by traditional means, you may use the ESET Uninstaller tool: https://download.eset.com/com/eset/tools/installers/eset_apps_remover/latest/esetuninstaller.exe Documentation is here, if you need it: https://support.eset.com/kb2289/#Windows10 Robbie // The Bald Nerd
  10. Thanks! You as well. Robbie // The Bald Nerd
  11. The ESET rogue scanner must be picking up each device that connects. It'd be tough to walk you through here in the forum, so perhaps a call to ESET support would be helpful if you're stumped, but I have a feeling you may have a networking issue if those devices are meant to be entirely separated from your LAN. Key point: those "rogue" devices are indeed devices which ESET Security Management has seen on your network. Personally I'd want to find out why the network is allowing cross-talk like that, since I'd dread the thought of BYOD having any amount of access to the corporate network without
  12. @Nkosinathis the only way ESET could be part of this issue is if the icons are hosted on a CDN that is being blocked for some reason. Temporarily disable your ESET product by right-clicking on it and choosing to turn it off for 5 minutes. During that window, open OneDrive. Are you icons back? Or still gone? If they're still gone, it has nothing to do with ESET. If they're back, best way we could help is if you right click where one of the icons are meant to appear and "Inspect", and then send us the URL that it is supposed to include in the <img src=""> tag. Once you know
  13. Hi @ScottWStewart Is there any chance you share your WiFi access or otherwise allow people to temporarily connect to your network? Cheers, Robbie // The Bald Nerd
  14. Just a suggestion: you might get better technical support if you didn't call technical support useless. Might be a good life lesson for you. Robbie // The Bald Nerd
  15. Do you have any network shares mounted to your computer as a drive letter which are accessed through the VPN? If yes, you might consider turning off scanning of Network Drives in the Real-Time Protection settings. This feature is on by default, and in many scenarios can be helpful, but over a VPN it'd be devilishly slow and could account for the strange scanner behavior. Robbie // The Bald Nerd
  16. Yeah, this does not sound like a virus. This sounds like command and control. Ie., someone is actually controlling your computer remotely. I'd suggest getting a local computer shop involved in cleaning it up, and in future make absolutely sure you are using a product that includes the 2-way firewall (eg., ESET Smart Security Premium), and never ignore the warnings without reading them carefully. You also have to be careful what you click on. It is most likely (though I can't know for sure with the little information you provided) that the tool the malicious user is using to control your comput
  17. Hi there, The MDC must be activated by a single license. But once activated, there is no obvious place to assign which license is in fact used for various mobile deployments. Scenario: Department 1 has 300 Android phones and an EEPA license for their devices. MDC is activated against this license, and the phones are protected by MDM. Department 2 has 150 Android phones and an EEPA license for their devices. Attempt to deploy MDM results in Department 1's license being used, showing as being over its device limit. How would the IT team remedy this and allow each depart
  18. You're assuming he has a home product, @Marcos. Need more info to answer. I disagree about it not being necessary since the license server keeps track of how many devices are using the license and a user must be licensed for each (regardless of whether it is on/connected or not).
  19. Hi @GrantMG Is this a consumer (home) product, or a business product? If it is a business product, is it administered by an ESMC / ERA server, or just standalone?
  20. Thanks @Mirek S. Any chance you have a Linux binary that uses the API to output JSON via command switches? From a quick glance at the docs it looks like it's to allow writing API functionality into my own apps. But I'd much prefer a simple terminal command I can run with some arguments, if possible. I do not know C\C++. Robbie // The Bald Nerd
  21. What is the running operating system on the virtual machines? And what installer are you using?
  22. Thanks @Mirek S. Once again, pointed me toward the right direction. My immediate thought reading your reply was to check the policy. Sure enough, the policy itself requires I manually re-upload the PFX file. It doesn't link to the file on disk, but rather uses the web interface to replace the cert manually. Uploaded the new file that way, and it worked. Problem fixed. So, the question now is, do I need to manually upload my PFX file like that every 3 months (Let's Encrypt certs are valid for 90 days) or can it be done from the Linux shell so I can script it into the cronjob? It'
  23. Thanks @Mirek S. I've added the root CA to my fullchain as instructed, re-created the PFX, and even re-compiled MDC against the new PFX just to be sure... restarted eraserver, tomcat9 and eramdmcore services, sent a wakeup call, and still see the same error after several minutes of waiting: HTTPS certificate chain is incomplete. Enrollment is not allowed. I even rebooted the entire server just to ensure it wasn't a service I missed caching the old chain. Any suggestions? Thanks! Robbie // The Bald Nerd
  24. Thanks @Mirek S. fullchain.pem is generated by letsencrypt certbot. As you likely already know, this file is the concatenation of cert.pem and chain.pem (the public cert + the chain). So, here is what mine looks like: -----BEGIN CERTIFICATE----- MIIFZzCCBE+gAwIBAgISA6/Knkmocs1B2C4VirBUiSJOMA0GCSqGSIb3DQEBCwUA MEoxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MSMwIQYDVQQD ExpMZXQncyBFbmNyeXB0IEF1dGhvcml0eSBYMzAeFw0xOTA5MjQxODQyMTFaFw0x OTEyMjMxODQyMTFaMCMxITAfBgNVBAMTGGVzbWMuZW5kcG9pbnRzZWN1cml0eS5j YTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKdBnRW+/xgVeSZ5EMpS AMQeHvW9f6HCrII
×
×
  • Create New...