Jump to content

santoso

Members
  • Posts

    130
  • Joined

  • Last visited

Posts posted by santoso

  1. 27 minutes ago, ewong said:

    If possible, can you post more of the tracelog?  It doesn't actually contain the part where the service fails to run.

    hello,

    here the log

    thank You,

    Quote

    [root@esmc]# tail -f /var/log/eset/RemoteAdministrator/Server/trace.log
    2020-07-06 09:24:44 Information: Kernel [Thread 7f8369e0b740]: Initialized module CDatabaseModule (used 16624 KB)
    2020-07-06 09:24:44 Information: Kernel [Thread 7f8369e0b740]: Initializing module CDataMinersModule
    2020-07-06 09:24:44 Information: CDataMinersModule [Thread 7f8369e0b740]: CStatusLogDataMiner: Initializing local status log cache
    2020-07-06 09:24:45 Information: CDataMinersModule [Thread 7f8369e0b740]: CStatusLogDataMiner: Finished initialization of status log cache
    2020-07-06 09:24:45 Information: CDataMinersModule [Thread 7f8369e0b740]: DataMinerCompletionHandler: Starting completion handler worker thread
    2020-07-06 09:24:45 Information: CDataMinersModule [Thread 7f8369e0b740]: CExclusionHitsSummaryDataminer: Reading initial status from 23 rows.
    2020-07-06 09:24:45 Information: Kernel [Thread 7f8369e0b740]: Initialized module CDataMinersModule (used 11124 KB)
    2020-07-06 09:24:45 Information: Kernel [Thread 7f8369e0b740]: Initializing module SchedulerModule
    2020-07-06 09:24:45 Information: Kernel [Thread 7f8369e0b740]: Initialized module SchedulerModule (used 0 KB)
    2020-07-06 09:24:45 Information: Kernel [Thread 7f8369e0b740]: Initializing module CServerSecurityModule
    2020-07-06 09:24:45 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder started with already locked hierarchy
    2020-07-06 09:24:46 Information: CDatabaseModule [Thread 7f8369e0b740]: Unique modifier started for 'ACL initialization'
    2020-07-06 09:24:46 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder - object placement took 0.113197s and read 16159 objects
    2020-07-06 09:24:48 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder - full rebuild took 1.8367s and ACL list size is 164788, number of objects to remove from ACL is 0, number of objects to add to ACL is 164788, full rebuild is forced
    2020-07-06 09:24:50 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder - objects removal took 1.58385s
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder - batch objects adding took 23.9121s
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: ACL builder - whole operation took 27.4458s
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: Unique modifier ended
    2020-07-06 09:25:14 Information: CServerSecurityModule [Thread 7f8369e0b740]: Initialized CertificationAuthorityManager with crypto library: "OpenSSL 1.0.2k-fips  26 Jan 2017"
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module CServerSecurityModule (used 123604 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module CNetworkGrpcModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module CNetworkGrpcModule (used 260 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module NetworkModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module NetworkModule (used 0 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module CCleanupModule
    2020-07-06 09:25:14 Information: CCleanupModule [Thread 7f8369e0b740]: Module initialized
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module CCleanupModule (used 0 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module CSymbolsModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module CSymbolsModule (used 528 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module CDynamicGroupsModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initialized module CDynamicGroupsModule (used 264 KB)
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Initializing module CTagsModule
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: Loading of tags starting.
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: 67, [135 ], [136 ]
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: 67, [135 ], [136 ]
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: 67, [135 ], [136 ]
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: #rows in blobs: 2
    2020-07-06 09:25:14 Information: CDatabaseModule [Thread 7f8369e0b740]: #column-attrs: 96
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CDynamicGroupsModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CSymbolsModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CCleanupModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: NetworkModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CNetworkGrpcModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CServerSecurityModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: SchedulerModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CDataMinersModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CDatabaseModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CUpdatesModule
    2020-07-06 09:25:14 Information: Kernel [Thread 7f8369e0b740]: Unloading module: CTranslatorModule
    2020-07-06 09:25:14 Error: Service [Thread 7f8369e0b740]: CAttributeAddHelper::Add(): not all codes are filled.

     

  2. On 2/14/2020 at 2:26 PM, MichalJ said:

    You have hidden the relevant information - your license ID, that would allow us to explore the problem further. Can you please send me a private message with your PLID, so we can take a look at the issue? How many devices in total have you connected / activated with the license? 

    Hi MichalJ,

    I send you private message

    Thank you for help,

    Regards

  3. On 2/12/2020 at 9:02 PM, itman said:

    I would be careful using this tool. Appears results are a bit ambiguous and can be misinterpreted:

    For example:

    Developer's response:

     

    Thank you itman for warning me. will be careful next time

    Is there any tool or a way that we can scan our computer vulnerability in network without run one by one in each computer

  4. 15 hours ago, itman said:

    Yes Eset have that, but it must run on client computer one by one
    This one can check all vulnerable computer remotely
    https://omerez.com/eternalblues/

  5. 12 hours ago, itman said:

    Make that PC and anything else on your network has been patched against the SMBv1 protocol vulnerability: https://docs.microsoft.com/en-us/security-updates/securitybulletins/2017/ms17-010

    Ref.: https://blog.malwarebytes.com/101/2018/12/how-threat-actors-are-using-smb-vulnerabilities/

    Thank you for remind me this vulnerability and yes when i scan our network with this tools there is some pc with vulnerability status YES

    https://omerez.com/eternalblues/

  6. On 2/4/2020 at 5:50 PM, Rami said:

    The worm is replicating itself from one of the computers or shares in the Network , ESET won't be able to remove it from the remote location , it will only be able to protect the computer that it's installed on

    You need to clean the worm from the infected PC/share , first of all you should disconnect it from the network to prevent it from keep trying replicate itself to others, then you try to clean it off and make sure the machine is fine and then you put it back to the network.

     

    On 2/5/2020 at 3:07 AM, itman said:

    A very useful tool in diagnosing suspect auto run entries on a device is SysInternal's Autoruns utility which can be downloaded from here: https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns . It has a number of optional settings including having all entries scanned at Virus Total.

    Note that there are a few FPs in this utility when run on Win 10; namely flagging non-existent Win system processes for which registry entries exist.

    Thank you guys fo response


    I use wireshark, procmon, process explorer and still hard to know where is infected pc.😅

    So, i decide to create folder sharing with permission for everyone then watch Eset endpoint - tools - network connection. Finally found it when there is connection to this pc use 445 port. Find that infected pc then install Eset and now our network clean again.

    2020-02-10_18-08-33.png.cd63eeeb3fc0dc210a53a314cae29c9d.png

    Thanks,

  7. Hello,

    We have Eset Endpoint Security installed in our network.

    Since January 30 It detected Win32/AutoRun.Agent.UD worm from folder sharing in PC and our WD My Cloud EX2 Ultra

    2020-02-03_10-59-13.png.66b9dba3ddf0a0d5c1cbb1e53bb1415e.png

    From dashboard - Firewall threat - Top sources of firewall detected events in last 7 days. only two IP appear, its our router and our WD My Cloud EX2 Ultra

    Can anyone know how to solved it by know who's pc was infected and spead it to our folder share in network

    Thank you,

  8. 49 minutes ago, Marcos said:

    In order to upgrade agent on clients, send an ESMC Component upgrade task to clients:

    image.png

    We will try this. all i know, it will download the installer from Eset server
    Installer will cache in http proxy? so other client will download installer from http proxy
    Or all client need to connect to internet and download installer one by one

  9. Hello,

    Yesterday we upgrade era to latest esmc, server upgrade run smoothly
    Then we want to upgrade agent 6.x and andpoint to our 1000 and more clients

    First, we try software install. It failed and say try manual instalation, we dont want manual installaiton.

    Then we try Run Command task, the task is run but agent still not upgrade, try the task to other machine and get same result
    We found out in event viewer that problem Error 1921 'Service ESET Remote Administrator Agent' (EraAgentSvc) could not stopped. Verify that you have sufficient priviledges to stop system services.

    Computer login with local administrator account, and era agent doesn't have password

    How to fix this, please help

    Thank you,

×
×
  • Create New...