Jump to content

peteyt

Most Valued Members
  • Posts

    2,147
  • Joined

  • Last visited

  • Days Won

    41

Posts posted by peteyt

  1. 20 hours ago, rotaru said:

    I never seen so far in an business environment , users to have the permission to disable the antivirus. 100% this was not the case.

    On the other hand , ESET is known for low level of protection against ransomware, especially   "never seen before"

    The problem is that a lot of people post about issues but never give enough information. Without more information it's hard to tell what happened to the user.

    For example are they on the latest version of Eset. Sounds a simple question but I've seen people posting about issues and they are using a version that's from years ago. Do they have Remote access enabled etc.

  2. 1 hour ago, Steward said:

    Guys, what's happening with you? I was infected by ransomware twice using ESET - Premium antivirus. 

    ESET antivirus was fully updated as windows , fortunately I make sure to save my files on an USB storage, ESET dectected the virus, but it passed the ransomware and I was fully encrypted. Kaspersky removed the Ransomware easily, I though ESET was a good antivirus but in fact is not.

     

    4 minutes ago, itman said:

    You also made a previous posting about ransomware: https://forum.eset.com/topic/32443-ramsonware-detected/ . Is this current posting related to the previous one?

    You also never posted follow up replies to questions asked in the previous posting.

    Also in this post they mentioned upgrading removed the ransomware but never updated the post to say about the files. Kaspersky may have deleted the ransomware but deleting only removes the virus so unsure if they now have encrypted files.

    I'd like to also add the fact you have been infected twice in the first place is worrying. As I have mentioned on a previous post about something similar, an AV can protect you but can never be 100 percent reliable. For that reason it is always good to have safe practices e.g. avoiding unknown sites, avoiding downloading cracks etc. If you are repeatedly infected, it is a good idea to look at the source and avoid returning

  3. On 5/24/2022 at 8:29 AM, anjayani said:

    we have 3 times in a row january,feb,march encrypted by this ransom with defferent extention, all installed eset endpoint security with secheduled update only once a day. i know this setting will give the endpoint slightly late to update. but we need to.

    in my opinion ,eventough the endpoint is late several version of update,eset dna detection should be able to prevent the threat that they already know including the new varian. is that correct?
    i just want to know, thats it

    thankyou

    If you have been encrypted 3 times you really should look at how you got infected in the first place.

    An antivirus can help but you really need to look at your habits and those of your employers if your part of a company, try to educate your staff and put in procedures e.g. backups

  4. 10 hours ago, AnthonyQ said:

    That is a pity. Viewing results/verdict, I think, is essential and should not be an exclusive feature for LiveGuard Advanced. 

    Yes. Someone from LiveGuard development team needs to investigate this issue. And in my opinion, if a sample exhibits sandbox-evasion-like behaviors, LiveGuard should not declare this sample is clean and safe.

    I'd like to see some improvements. If liveguard is no good detecting sandbox evasion surely many will just abuse this. @Marcosis there anything eset could implement to detect things like this?

  5. On 5/16/2022 at 7:30 AM, agiza said:

    Hello everyone

    I have a problem with it appearing next to the clock I want to stop this notification

    how to stop windows firewall notifications(windows firewall and eset firewall are both turned off) Attached screenshot

    (windows firewall and eset firewall are both turned off)

    windows firewall and eset firewall are both turned off.png

    I'd recommend opening eset. If you click the little triangle arrow it should be there. Open up and see if eset is disabled and if so try and enable it. If it doesn't work send us a screenshot of what you see and you may need to generate a log

  6. 20 hours ago, New_Style_xd said:

    I didn't find the print showing the last database update date, that's why I said that the machine could be infected using the EIS.

    I think what the person earlier was saying is that live guard is missing features that are available in eset  advanced threat defence, now known as ESET LiveGuard Advanced.

    With ESET LiveGuard Advanced, which is available for business users, you can select the confident level, the idea being you can get alerted for things that appear suspicious but could be false positives. This isn't an option for home users and I belive the business users have other extra options to. It's not an option for home users to avoid false positives as a home user wouldn't be able to tell the difference.

    That's not to say liveguard can't protect you. I belive any protection is better than none.

  7. On 5/14/2022 at 11:51 AM, Marcos said:

    I don't know if the bell icon appeared there in the past, however, I see it when I tap the menu icon now:  image.png

    I can confirm that clicking the lines brings it up and shows the bell although as far as I can remember the bell was always shown by default. Doesn't bother me just wasn't sure if it was a bug

  8. 27 minutes ago, New_Style_xd said:

    As for improvements like wildcards for HIPS and ransomware folder and rollback protection etc. that other AVs offer it would be perfect if ESET had implemented these things that are already basic that most AVs have had for many years.

    This is exactly my point.

    If people class these missing features as basic, to me surely that should be the priority.

    If eset does decide to tweak the UI then great but when the next major version is released I'd be more happy to see newer security features and improved security features over the UI.

    I use Firewall in automatic mode but used to use it in manual. One of my biggest criticisms UI wise is the Firewall rules editor is not that UI friendly. You can't simply see the names e.g program 1 as it adds text to the start and unlike years ago there's not a logo icon to go with the names. As the Firewall works with an order system I.e higher rules take precedence so you can't actually arrange them by name.

    As much as I dislike the above method and hope one day to see it changed, I'd rather see improvements on actual security features.

  9. On 5/11/2022 at 4:03 AM, Giordano Melchiorri said:

    I am a computer scientist and I have been an ESET customer for 20 years never had any problems until today I updated my antivirus without problems but when I did the same thing with my friends, who had decided to buy it via Amazon, I had problems with the code in fact, once entered it gives me error ACT-25, In their case I activated the TRY function and re-entered the activation code, but always the same.
    On other occasions he would give me the message, "MAXIMUM NUMBER OF LICENSES EXCEEDED" but it was the first one made after opening a new package.

    WHAT SHOULD I DO?

    Are you getting the issue with your license or the friend who purchased via amazon.

    Amazon wise eset aways recommends buying your license directly from eset. Buying from sites like Amazon can be risky as some people resell their licenses on these sites but they will sell a license that is designed for let's say 1 user to multiple people which will then cause the license to get blocked.

    I'd recommend sharing the public id license which is not the same as your actual license and is Safe to share on here 

  10. I've noticed for the last few weeks while I can see notifications when using chrome on my galaxy s20e the actual bell icon seems to have vanished. I'm sure it used to be there. Is this new behaviour or a new. Using chrome's desktop mode I can see the bell

    Screenshot_20220514-113711_Chrome.jpg

  11. On 5/12/2022 at 2:45 PM, TheStill said:

    There may be many people that do that but the percentage for that figure is going to be tiny in comparison to regular users that install once and then never look at the GUI again. It's understandable why they haven't allocated any resources to it. But PC techs will be happy that the GUI remains fairly consistent year on year. Unlike other software companies that insist on changing their GUI every year to make it look like there have been improvements. 

    Yeah with a previous AV I used before Eset I noticed each year that things got changed each yeah, and not just with AVs but programs in general. Sometimes one or new extras came but it often seemed the change in the UI was to trick people into thinking there was a lot of changes.

    As someone who has just moved into a basic IT job that involves basic assistance changes do tend to confuse new users. I'd never say no to changes but I do also appreciate that Esets UI has been pretty consistent for a while.

    As for the dark mode and general UI changes, if Eset can do changes then great but I'd rather it focused on protection over UI tweaks. There's features such as wildcards for HIPS, ransomware folder and roll back protection etc. That other AVs offer that many would like to see and I'd rather this took preference over design choices 

  12. I should also add what an unwanted application is. The link bellow defines it

    https://help.eset.com/glossary/en-US/unwanted_application.html

    Basically unwanted programs are programs that aren't technically malware but are greyware. They may try and install extra stuff, change windows settings, have tracking stuff and just general bad business practises.

    I'm mentioning this as I've seen a few people in the past demand eset should decide what to do with PUA but the whole point of this option is it is down to the user. If a warning comes up with the setting enabled, the user has to decide if the positives outweigh the positives, but usually if it's coming up there's probably a reason.

    That being said sometimes genuine stuff can be flagged because of what it does e.g. it could be potentially misused 

     

  13. 17 hours ago, nexon said:

     

    Main beta means for example version 16 or version 17?

    Not 15.3 for example or 15.4etc right? This is only builds... 

    Which benefits? 

    Eset doesn't release full betas much. Sometimes there might be benefits but usually the main thing is trying something before it is released, checking for bugs and giving feedback. Anyone can generally join these betas.

    Another kind of beta also exists for active forum users. These do include things like 15.1 and so on but often these betas will see new features before anyone even knows what they are.

    This is ran by @Peter Randziak but as mentioned I belive to be considered you need to be a regular active forum user. There are sometimes benefits but I'm reluctant to really give much information as everyone using this beta has to sign an NDA

  14. 1 hour ago, No_more_time said:

    Dear Support,

    I have the following problem:

    "Web and Email protection is non-functional
    System extension required for Web and Email protection was not configured because of an error. Try to restart macOS or reinstall the product."

    Obviously, before spending my time writing here, I have already tried to follow the useless advice:
    - Try to restart macOS or reinstall the product.

    I have also spent more time reading other comments on the same issue without finding a solution. I don't want to lose more time, and I'm not going to send you any logs nor open a support ticket (privacy concerns). You still don't know how to provide a public solution, at least until now, even after months from the other previous comments with the same Security Risk. 

    Anyway, I'm asking you to provide a public solution to this annoying issue without making me lose more time. I manage around 50 licenses.

    I hope you will not make me lose more time again.

    Best Regards

     

     

     

     

     

    Logs will be needed. Often what seems like the same issue for 1 or more users, can actually be something different. Because of multiple different variables e.g. different setups, networks, hardware, software, there can't be a 1 fix solution.

    I should add that if you add the logs on here via the attachment option only eset staff can access these. When generating logs you can also decide what is shown 

  15. On 4/23/2022 at 7:58 PM, Ravenous said:

    I have access to the site. That was not my complaint. It's the continual pop up wanting from Nod32 of the "threat" even though I have the site excluded from detection in List of Allowed Sites and List of Addresses. 

    I use Brave, Edge, and sometimes Chrome, not Firefox. Haven't touched FF in many many years. I use uMatrix extension. I got rather annoyed with uBlock, but maybe I'll give it another try on Brave. I still have it on Chrome, but getting it set up the way I like is a bit of a hassle. 

    Really rather annoying to have to disable Nod32 every single time I go to the site. In my mind it should already be avoiding detection on the site since I excluded the site from detection in List of Allowed Sites and also List of Addresses. That is why I think Nod32 is not working as intended. 

    I just want to add the fact you've not been infected is irrelevant.

    If eset is finding a threat it is probably also stopping it from running. Disabling eset or putting an exception for the site would mean you where no longer getting that protection.

    I'd also add that the age of a site is not relevant. Many popular sites have been hacked in the past, their popularity working as an advantage for the hackers. There was a big outcry a while back as popular sites where using things like coinhive to use visitors browsers to mine for crypto currency without the users being aware.

    Websites can also be taken over. Often you'll find it may not be the site but content provided via third parties.

    I think @itman suggestion is the best option if you want to continue to use the website. However if the site is risky it is risky, and whatever method you use there will be a risk. However using something that will stop the script from ever running is safer than putting an exception via eset that would put you at risk for future issues 

  16. On 4/23/2022 at 6:36 PM, Sannestia said:

    Same happened to me, on the Pixel 6 pro. Brand new phone pretty much, no launchers or nothing on it, sent in a report no reply yet. Will update when I hear something. I'll probably uninstall if it isn't fixable in the next 24 hours because it's already been in my way at least 15 times in 30 minutes of usage.

    Screenshot_20220423-123656.png

    Did you use the apps buit in form and did you get an automated email with a ticket number? If so share that on here.

    I did think I saw this once and disabled it myself but can't find it now. My notifications for eset where all on apart from always on but turning that on didn't do anything.

×
×
  • Create New...