Jump to content

itman

Most Valued Members
  • Posts

    12,836
  • Joined

  • Last visited

  • Days Won

    337

Posts posted by itman

  1. I will also add that since it appears you are a firewall expert, you should most certainly know what exclusions they would require.

    Just don't expect Eset to be the least bit "accommodating" when it comes to conflicts with an obsolete and unsupported circa 2013 firewall.

  2. Confirmed this was a "glitch" in the Security Report. Resetting it did the trick and all incoming e-mails are correctly identified count wise in the report. Well, in-box wise they are.

    Appears that anything dumped into the Bulk e-mail; etc.. folders in Thunderbird are not reflected in the report counts but I am not sure those are actually physically downloaded to my device.

  3. Accordingly to this: https://tools.ietf.org/html/draft-ietf-tls-oldversions-deprecate-00 , TLS 1.0 has already been deprecated. However, Microsoft previously has stated that it will be supported in IE11 until 2020. Maybe something has changed in that regard?  Note that some app software like Salesforce has already disabled use of TLS 1.0 in IE11. 

  4. One finally comment about this attack for anyone reviewing this posting for future reference.

    This attack although similar to that described in this posting: https://forum.eset.com/topic/13651-powershell-script-possible-malicious-attack/ was different. In that posting, the attacker was using WMI to maintain persistence of the malicious WMI command event. The referenced WMILister_30.vbs script developed by Eset was coded to not only remove the WMI command event, but also its persistent recreation capability via WMI.

    In this posting's attack, it appears PowerShell was run via autorun capability; e.g. registry run key or Windows startup directory that re-created the malicious WMI consumer event at system boot time to maintain its persistence. Hence the reoccurrence of the WMI command event after WMILister_30.vbs script was deployed. 

    This is a great example of how malware authors are constantly evolving their tactics to avoid mitigation methods.

  5. I was also going to recommend the Eset Network wizard to create the rule.

    I suspect something is wrong with his existing firewall rules. If I recollect, Eset firewall Interactive mode adds a "global" block? rule for outbound connections at the bottom of the existing rules set. I have had issues with that rule in prior Interactive mode use. I believe I had to change that rule to "ask" to receive alerts. Also, I had to always ensure the rule was at the end of the existing rule set.

    -EDIT- I also noticed Abode Reader on Win 10 1809 for example is now dynamically creating Win firewall rules each time a .pdf is accessed. Only God knows why they are doing such nonsense. This app is also Abobe based and might also be doing such nonsense.

  6. 10 hours ago, Sejjeto said:

    they cannot get to websites that show to have outdated TLS

    Perhaps they have disabled TLS 1.0 in IE11? Maybe something to do with their Group Policy settings?

    I use IE11 as my primary browser and have never experienced any profound performance issues with Eset installed.

  7. 13 hours ago, novice said:

    PC Tools Firewall Plus

    The firewall is obsolete and hasn't been supported since mid-2013.

    You're better advised to stick with the Win 7 firewall. If you want something to monitor outbound connections, check out the third party Win 7 firewall extensions such as Windows Firewall Control: https://www.binisoft.org/wfc.php or the like. Better yet, update to Win 10 with a better built-in firewall since Win 7 end-of-life is next year. Or even more advisable, just upgrade to Eset Internet Security which also provides IDS protection.

  8. 13 minutes ago, novice said:

     

    I have a firewall which I want to run it with NOD32 Antivirus (let's name it generic "Firewall"

    Normally, you would not have to add exclusions for a basic third party firewall in NOD32. You only need to add exclusions when another security product that performs realtime scanning is employed. Which BTW is not recommended.

    Are you referring to Comodo perhaps?

  9. 51 minutes ago, Marcos said:

    It may not be a legit Flashplayer but malware disguised under that name :)

    Ah, yes. I didn't expand the screen shot enough; Adobe Flash Player.exe? I believe the legit version is Flash Player.exe.

    Does not an AMS based log entyry show the executable path information?

  10. After opening my e-mail client, Thunderbird, I decided to check recently scanned e-mail counts in the security report. It only showed a count of 10 which appear to be the e-mails I physically opened and read versus the dozens of unread e-mails that were actually downloaded.

    I hope that this is just a bug in the security report and not that Eset is no longer scanning all e-mails upon download as was the case in prior versions?

  11. As @Marcos previously requested, you need to access Eset's Detection log and find the recent entry associated with this malware detection. You then need to post what is shown there in English.

    To accomplish this, right click on the log entry and select "Copy." Open your browser and enter this URL: https://translate.google.com/ . Make sure English is selected in the "Translation" section. Paste what you previous copied into the "Detect Language" section.  After the translation section is complete, copy what is shown there in English to your forum posting.

  12. Open the Eset GUI. Using Advanced Setup, click on "Web and Email." Click on  "Email client protection." Refer to the below screen shot . Uncheck "Enable email protection by client plug-ins." Save your changes. This should eliminate the Eset add-on for Outlook.

    Note doing this will reduce Eset's e-mail protection and e-mail will only be scanned upon arrival.

    Eset_Outlook.thumb.png.4966b9f82827dfe2b4fe30e390f2f05d.png

×
×
  • Create New...