Jump to content

josh.davesc

Members
  • Posts

    7
  • Joined

  • Last visited

About josh.davesc

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Zimbabwe
  1. I want to setup ics on windows xp to give my other pc win 7 internet access. I have blocked www.comone.co.zw on xp using eset endpoint security web control so does the web control also filter and block the site if it accessed by windows 7 or you will have to block it manually on windows 7
  2. so how does the firewall prioties repeated rules eg which one of the rule is followed a rule which blocks iexplorer or which allows iexplorer
  3. DEAR DEVELOPER Im typing this message suggesting ideas on your eset smart security firewall since there are many issues concerning your firewall Your firewall is easy and I love it but at the same time I dislike it. I found that I make the same firewall rules and the firewall gets confused FOR EXAMPLE I can create a rule that allows Internet explorer traffic and create another which blocks internet explorer traffic. Both of the traffics are Inbound and Outbound. This makes the firewall confused and this issue has to be fixed by creating a new Zone and Rule Editor which only allows one type of rule to be created. Secondly I can repeat system rules by creating a same rule creating a rule of my own For Example I can Create Another DHCP rule but this one block the traffic of the DHCP but there is already a system rule of DHCP. If you can, please create a Zone and Rule Editor which checks and make sure that rules wont repeat. That is why sometimes the firewall fails to read configuration. If a RULE is repeated it must notify the user. Thirdly Firewall must take precedence on traffic rules that is ports and ip rules and then follow the program rule For Example I can Block port 80 but at the same time Internet Explorer uses the port 80 and this makes me feel insecure. If you can, please make sure that it checks Traffic rules first So that when programs try to use the blocked port eset firewall must automatically block the program trying to use the Blocked Program I love Your Product and I have been using it since way back I hope you don’t put deaf ears on thank you by JOSH
  4. hie helpers and developers i work at a cafe. I monitor the cafe on behalf of my manager. the cafe started since way back and we have been in trouble because people downloaded files and programs which were infected and crashed our computers .the computers for users are desktops and we have 43. After a while me and my manaer bought ESET ENDPOINT SECURITY and bought a license for fifty computers. We also setup the mirror server with default settings such as port 2221 for providing updating through http and many clever people would hack using wifi to update their eset endpoint products. We tried to change the port but this made other desktops fail to connect. we allowed the new port 3 through eset firewall on all computers because we disabled windows firewall and we have no other firewall installed except eset. Now i turned on ntml authentication on eset mirror server so what would be the usernames and passwords for clients since the documentation of eset is complicated and i dont understand. please i want to know how to create eset usernames and passwords for clients. my manager wants this to work because he is very strict when it comes to programs .please just help me how to configure credentials for clients to update from update server. we only use the http server method to update
×
×
  • Create New...