Jump to content

housecat

Members
  • Posts

    9
  • Joined

  • Last visited

About housecat

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    New Zealand
  1. Thank you Marcos, very useful to know Building on that point, am I right in thinking odscan is only available on EEA for Linux, but not Windows? Thanks. The large majority of our machines are Windows
  2. Just elaborating on what actually needs to happen (apologies can't edit the original post) - Using our specialist software suite we run a ruby script to call the antivirus program to initiate scanning a set of items selected within the suite. When the antivirus identifies an infected file it reports it back to the script. The script then remove the infected file from our suite and replaces with a placeholder, while the antivirus continues to scan the next items
  3. Hi all, our team processes large volume of data on a day-to-day basis with a specialised software suite. As part of the process we need to load selected items into memory and run virus scans over the file set. We currently use ClamAV's daemon for this purpose. Does anyone have any experience with doing something similar or know if ESET can achieve this? Thanks
  4. So with the below instructions I was able to eliminate the alerts from the security product GUI on the end nodes, but I still see the alerts in the web console under 'COMPUTERS' view. Is there a way to eliminate the alerts from here also?
  5. Thanks Marcos this is very helpful! The systems running in our offline environment (forensic lab) requires accessing large volume of data (hundreds of gigs or tb at a time) on a constant basis, where we need to keep files in place even if they're infected (can't just have them deleted or quarantined to an isolated place) and therefore we have indeed only been using our current antivirus solution as an on-demand scanner Very keen to hear your thoughts and insights on the best practices for an environment such as ours though 👍
  6. Thanks Michael this is very helpful! I'm getting to know the product better and better day by day 😊
  7. Thanks Michael for that. Hmm in that case can I stop the Http Proxy Usage policy from being applied automatically on the computer? Cos it seems that the config in my policy is overwritten by that in the Http Proxy Usage policy Thanks!
  8. Greetings, I'm running a test for ESET PROTECT (VA) with 3 x Windows end nodes in an offline environment. I have created an All-in-One installer including two custom policies specified (one for endpoint one for agent). I can still see the names of these policies shown at the beginning of the installation process, however, I noticed from the web console that neither of the policies were applied to the security product initially, then after the auto initial scan starts running, the builtin 'HTTP Proxy usage' policies for both ESET Endpoint for Windows and ESET Management Agent were applied on the security product on the node Does anyone know how to fix this? Thanks!
  9. Hi there, just wanted to find out if there is a way to dismiss warnings/alerts in ESET PROTECT's web console? For instance, the policy we intend to have in our offline environment disables real-time file system and anti-phishing protection, and therefore this shows up as a security risk for every single end nodes. Without being able to dismiss warnings/alerts like these, our end nodes would forever pose as problematic in the web console..! Thanks very much
×
×
  • Create New...