Jump to content

tgr

Members
  • Posts

    18
  • Joined

  • Last visited

Posts posted by tgr

  1. Can nobody help me?

    So I have a detection (it doesn't matter which one because it occurs with different ones).

    The triggerin Event is: CodeInjection %PROGRAMFILES%\wsl\msrdc.exe (APC queue)

    Event:  CodeInjectionmsrdc.exe (ApcQueue)
     
    What I want now is that such detections with this trigger event are automatically resolved.Because for me these messages are finished, I know where they come from.

    Do I now have to exclude this in the rules?

     
     
    •  

     

  2. Ok thanks for the idea. Here again a description what I mean:

    So I mean I have a detection (it doesn't matter which one because it occurs with different ones).

    The triggerin Event is: CodeInjection %PROGRAMFILES%\wsl\msrdc.exe (APC queue)

    Event:  CodeInjectionmsrdc.exe (ApcQueue)
     
    What I want now is that such detections with this trigger event are automatically resolved.Because for me these messages are finished, I know where they come from.

    Do I now have to exclude this in the rules?

  3. Hi together

    I think i have a simple question but i haven't found a solution anywhere.
    We have detections and I want to create an exclusion for them.

    But now my problem: The criteria for creating an exclusion for this detection is the trigger that triggers it.

    So I want this detection to be seen as solved when the detection is triggered by a certain event.

    When I create the extension, I can specify various things (cmd line, signer, process path starts) but not the trigger event. How could I do that?

     

    Thank for the help!

    Kind regards

     

  4. Hello

    We have the following Detections time to time:

    Detection: Injection into trusted process

    Triggering process: excel.exe

    Event: CodeInjection msrdc.exe

    The Triggering process can also be outlook.exe or winword.exe.

    But we don't understand how these detections are triggered.

    The msrdc.exe process has a connection to the local WSL (Windows Subsystem Linux). But why does it generate these detections  when an Excel file is opened or an Outlook mail is opened?
    WSL runs in the background and actually has nothing to do with this.

    Can you help me please?

     

    Thanks!

     

  5. Hello together

    I have updated my Eset inspect server to version 1.11.2872.0.

    Since then I have had the problem that I am suddenly logged out automatically (and not after the automatic logout time).

    The following error message then appears:

    You're not authorized to execute this action (this user has admin rights).
    image.png.1dfe86f789399a12ebdb64b54d5dd956.png

    It happens most often when I am in the detections or rules section.
    I have then created a new user, also with admin rights, but the same thing happens there.

    Before the update, this worked without any problems.

     

    Can anyone help me?

    Thanks

  6. Hello

    I have a question about exclusions.

    If I make an exclusion for a rule, do I still see those messages somewhere in the logs?

    Because without exclusions there are too many messages, but it would be important for us if it is still logged somewhere (to be able to track it in case of an incident). 

    I use ESET Inspect 1.11.

    I also dont see a Debug message in the EI Logfile on the client.

     

     

    Thanks and kind regards!

  7. Hello

    I have a question about exclusions.

    If I make an exclusion for a rule, do I still see those messages somewhere in the logs?

    Because without exclusions there are too many messages, but it would be important for us if it is still logged somewhere (to be able to track it in case of an incident). 

     

    Thanks and kind regards!

     

×
×
  • Create New...