After analyzing my Network traffic, I found some unencrypted HTTP-Requests. After investigating further, it seems those requests are sent by eset-software on the Clients in the Network.
ESET Software is revealing the Host OS-Version and Processor-Architecture in plain text via HTTP to several IP-Adresses:
91.288.166.0/24
91.228.167.0/24
185.94.157.11
It seems, that those requests are used to concact update-servers.
My question:
Can I block those requests without restricting the functionality of the eset products?
I see a security issue, as a man-in-the-middle-attack easily can find out the target OS and used security Software.