bbahes 29 Posted February 17, 2018 Share Posted February 17, 2018 Do these solutions still apply for 6.6 products? Are they built-in latest products or do I have to create them manually? https://support.eset.com/KB6119/?ref=yt/ Link to comment Share on other sites More sharing options...
Administrators Marcos 4,704 Posted February 17, 2018 Administrators Share Posted February 17, 2018 Those rules will never be included with Endpoint since they block legitimate tools and the user must know how to adjust them in case they cause issues. Link to comment Share on other sites More sharing options...
bbahes 29 Posted February 17, 2018 Author Share Posted February 17, 2018 52 minutes ago, Marcos said: Those rules will never be included with Endpoint since they block legitimate tools and the user must know how to adjust them in case they cause issues. Would you advise to use them or not given the new engine in 6.6 should recognize known ransomware? Link to comment Share on other sites More sharing options...
Administrators Marcos 4,704 Posted February 17, 2018 Administrators Share Posted February 17, 2018 Since there's no security solution that would be able to provide 100% malware detection and protection without excessive number of false positives, it's always a good practice to strengthen protection by other means, such as by HIPS, firewall rules, etc. if the end user or admin is savvy enough to deal with possible issues that such rules may cause at times. Link to comment Share on other sites More sharing options...
Recommended Posts