Administrators Marcos 4,844 Posted September 4, 2019 Administrators Share Posted September 4, 2019 2 minutes ago, itman said: At least, Eset should do something in this area to prevent long time users like myself from moving on to security solutions that have such capability. It's currently planned for Endpoint. Whether or not the settings will get to consumer products, time will tell. No decision has been made in this regard yet. Link to comment Share on other sites More sharing options...
itman 1,602 Posted September 4, 2019 Share Posted September 4, 2019 2 minutes ago, Marcos said: It's currently planned for Endpoint. Whether or not the settings will get to consumer products, time will tell. No decision has been made in this regard yet. This is the problem. I would gladly switch to Endpoint. However, I don't want to buy 5 licenses which it appears is Eset's purchase minimum for the product. Eset should have a single license purchase option with a higher cost which would be perfectly acceptable. Another suggestion is Eset offer an "advanced" Internet Security version which in effect would be a "re-bagged" Endpoint version. fabioquadros_ and L0ckJaw 2 Link to comment Share on other sites More sharing options...
L0ckJaw 3 Posted September 4, 2019 Share Posted September 4, 2019 Break in again, but why do other AV vendors have the option implemented in their AV suite for Consumers and Eset only wants to apply it for business users only ? If ESET wants the Endpoint protection as their core business i can understand that, but stop with stripped consumer versions and switch to Endpoint protection only or offer Endpoint protection to Consumers to. Link to comment Share on other sites More sharing options...
wraith 25 Posted September 4, 2019 Author Share Posted September 4, 2019 (edited) Imho ESET should add some advanced features like itman suggested. Keep them switched off by default so that only advanced users can enable them. I agree with the LiveGrid implementation part. Allow all safe processes(green), monitor the activities of non-popular(yellow) and alert upon suspicious behaviour and block for unsafe processes(red). If that sounds too much, implement a protected folders feature like defender, trend micro, BitDefender, avast so that files in those folders can only be accessed by safe applications and will be prompted if accessed by unknown applications. Edited September 4, 2019 by wraith ECELeader and fabioquadros_ 2 Link to comment Share on other sites More sharing options...
wraith 25 Posted September 4, 2019 Author Share Posted September 4, 2019 On 9/3/2019 at 7:40 PM, Marcos said: @wraith, please collect logs with ESET Log Collector from the machine where you tested the sample and provide me with the generated archive. It looks like we didn't get it via the LiveGrid feedback system and couldn't react to it earlier. I'll send you the logs once I reach home from work, although I highly doubt it would be useful since I always run any unknown file in shadow defender shadow mode before executing in the real mode. Link to comment Share on other sites More sharing options...
Administrators Marcos 4,844 Posted September 4, 2019 Administrators Share Posted September 4, 2019 11 minutes ago, wraith said: Allow all safe processes(green), monitor the activities of non-popular(yellow) and alert upon suspicious behaviour and block for unsafe processes(red). Windows update files may be also suspicious from the beginning (yellow) so blocking them just because of this could crash Windows updates or the whole OS for instance (not every binary is signed by MS). Or imagine explorer.exe being continuously terminated if there were no antiFP mechanisms. We need to be careful about FPs; a single serious FP could cause bigger damage than actual undetected malware. Link to comment Share on other sites More sharing options...
Dump Kids 0 Posted September 4, 2019 Share Posted September 4, 2019 On 9/1/2019 at 1:07 AM, Marcos said: Please check https://www.eset.com/int/about/technology and see how many of ESET's features are missing in competitive AVs HIPS itself is the basement for: - Self-defense - Ransomware Shield - Advanced Memory Scanner - Exploit Blocker - Deep Behavioral Inspection Plus non-HIPS feature Advanced Machine Learning (v13 beta): Where can I find features "DEEP BEHAVIORAL INSPECTION' ? I didn't find that feature in the ESET Endpoint Security (7.1.2053.0), is that feature found in another eset version? or there must be a button that I have to enable? This installed components on my computer This my menu on advance setting Link to comment Share on other sites More sharing options...
Administrators Marcos 4,844 Posted September 4, 2019 Administrators Share Posted September 4, 2019 5 minutes ago, Dump Kids said: Where can I find features "DEEP BEHAVIORAL INSPECTION' ? I didn't find that feature in the ESET Endpoint Security (7.1.2053.0) The screen shot is from ESET Internet Security v12.2.23 for home users. As far as I know, it's planned to be enabled in Endpoint v7.2 which will bring bigger changes later this year. Link to comment Share on other sites More sharing options...
wraith 25 Posted September 4, 2019 Author Share Posted September 4, 2019 2 hours ago, Marcos said: Windows update files may be also suspicious from the beginning (yellow) so blocking them just because of this could crash Windows updates or the whole OS for instance (not every binary is signed by MS). Or imagine explorer.exe being continuously terminated if there were no antiFP mechanisms. We need to be careful about FPs; a single serious FP could cause bigger damage than actual undetected malware. Ok that sounds reasonable. But ESET can surely implement the idea of protected folders. Let it be disabled by default. Advanced users who want that can enable that but at least provide it as an option. fabioquadros_ and ECELeader 2 Link to comment Share on other sites More sharing options...
itman 1,602 Posted September 4, 2019 Share Posted September 4, 2019 3 hours ago, Marcos said: Windows update files may be also suspicious from the beginning (yellow) so blocking them just because of this could crash Windows updates or the whole OS for instance (not every binary is signed by MS). Or imagine explorer.exe being continuously terminated if there were no antiFP mechanisms. We need to be careful about FPs; a single serious FP could cause bigger damage than actual undetected malware. Agreed. But if Eset hueristics detects a Live Grid red status risky unknown process, it should throw a suspicious alert and let the user make the decision. Again this should be an advanced Live Grid option with the disclaimer that activating it could lead to a FP detection. Also, it is highly unlikely Live Grid is going to classify a Win base OS process as risky. Really, this isn't "rocket science." fabioquadros_ 1 Link to comment Share on other sites More sharing options...
itman 1,602 Posted September 4, 2019 Share Posted September 4, 2019 (edited) Also on Win 10, native SmartScreen goes much farther in that it will block (default setting) or warn of any executable not downloaded from the Win Store. Problem is I don't fully trust it in regards to stealthy malware code execution such as reverse shell and the like. -EDIT- Also another major issue with native SmartScreen is Microsoft in its "infinite dis-wisdom" runs it as a medium integrity process. As such, it can be easily suspended by malware to run its code. Edited September 4, 2019 by itman peteyt 1 Link to comment Share on other sites More sharing options...
Most Valued Members peteyt 373 Posted September 4, 2019 Most Valued Members Share Posted September 4, 2019 2 hours ago, itman said: Agreed. But if Eset hueristics detects a Live Grid red status risky unknown process, it should throw a suspicious alert and let the user make the decision. Again this should be an advanced Live Grid option with the disclaimer that activating it could lead to a FP detection. Also, it is highly unlikely Live Grid is going to classify a Win base OS process as risky. Really, this isn't "rocket science." Yeah I'd go for this and have it disabled by default. I get the whole thing about false positives and it is a risky balance but really the users eset wants to protect should hardly ever need to go into the advanced option. These users would probably just install eset with standard defaults. The thing is a lot of users like choice and I'd worry eset would put some more advanced users off by not having these options. Hips for example can be dangerous in the wrong hands but it's an option and generally standard users will not enable because of the risks so things like the thing above should work as only those knowing the risks should enable them ECELeader 1 Link to comment Share on other sites More sharing options...
Recommended Posts