Jump to content

jdeconto

Members
  • Posts

    13
  • Joined

  • Last visited

About jdeconto

  • Rank
    Newbie
    Newbie

Profile Information

  • Location
    Canada
  1. Yeah, looks like I used a bad installer and didn't have security on my device. Thanks for the assistance Marcos!
  2. I looked on my endpoint antivirus, it does not have any of the policies set from our cloud portal:
  3. I am still able to view websites and ping local machines when I try. Sorry I should have clarified, my screenshots are from ESET PROTECT CLOUD. I am trying to apply this policy just to my 1 machine on the network.
  4. I have been trying a few more things and still cannot get these firewall rules to be implemented. I know the policy is implementing since I tried using Silent mode and that did turn on when I saved the policy. I still cannot get the firewall rules though. I am trying with a new one to make sure it has no possible issues from what ever I was messing around with on the older policy. Currently what I have is: Do I need to fill in the Local and Remote sections?
  5. So I have been doing a bit more research on this myself, if I am understanding this correctly, https://help.eset.com/protect_cloud/en-US/admin_pol.html?admin_pol_ordering_groups.html, then as long as none of the groups above my dynamic group have a policy with a Force flag enabled, my policy should take priority right? Currently I am assigning it directly to my computer, if my understanding is correct, then this should work since my policy is the only one using the Force flag, Yet I am still getting no result when I use my computer. Also Marcos, you asked a bit ago how I was testing for blocking local, I was testing with a ping to a local printer, since I can get a response the firewall was not applying.
  6. I think it would but I want to be able to allow connections granularly, I was just starting with fully blocking the network. I think the policy should be able to handle something like that. Granted I am not the most experienced user on ESET.
  7. Hey Marcos, I know you are most likely pretty busy but would you have any other suggestions to get this policy up and running?
  8. Yes. Eventually I want to be able to granularly allow access but at this time I am focusing on locking the computer completely out of the network.
  9. Okay, application has been removed. In regards to working correctly, would creating an additional rule allowing access for ports 80 and 443 be enough? I am trying to totally lock the machine out from the local network.
  10. The Replace for clients was selected by default. I did show built in rules and moved mine to the top. The svchost.exe application was added in by another tech as a test. I was originally just trying to block all access, regardless of application.
  11. Gaaaahhh, sorry I selected the wrong product, it is not my day today. This is for a client side machine not a server. Would you recommend I recreate this post in the correct forum?
  12. Hey! I am having issues making a firewall policy apply to my machine via the Protect Cloud portal. Currently I have the policy applying to a test group that only contains my computer. All of the policies have the lightning bolt symbol selected to make sure that they trigger. I am trying to block all access, local and internet. My rules for the policy are: As well, Zone All Addresses: I must be missing something simple that is preventing the policy from applying.
×
×
  • Create New...