When we release a version update, it is load balanced across our global user base. As such, it can take up to 72 hours to apply to all endpoints.
- Bug fixes.
Already have an account? Login
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Have they fixed detecting all sorts of plist entries as malware?
Info.plist, Keylogger.SpectorPro.r, VolumesTime Machine BackupsBackups.backupdbSimon's MBP2016-04-06-025514.inProgress7051187E-C23D-40FD-8A68-4FB40DB72C30Macintosh HDSystemLibraryExtensionsAppleKextExcludeList.kextContents, 00000000000000000000000000000000, 6 hours 30 mins 29 secs This continuously breaks the Time Machine backups to an external drive.
My clients expect the agent to sit there and do it's job. And so do I, as I'm managing thousands of endpoints and I shouldn't have to log in locally on MAC systems to turn something like that off as I have no real policy control from the GSM.
This really turns people off the product/service and I certainly hope that the development team can really get the MAC product up to snuff. It really seems half baked.
Scanning external drives is completely up to you. By default the Agent does its job and scans external drives, however we are unable to determine what every customer that uses our client will name their backup. For instance my backups are not called Time Machine but it will react in the same manner. I am sorry that you feel that the product is not up to the par you would like, we are building out changes and advances for it everyday. In certain instances such as this, where Apple builds out a list of known puas and keyloggers, that we are going to have to work with them in order to address it. The detection that you posted was corrected six days after your client detected it. I was able to work out a way to stop detecting that file and future updates of that file without the clients having to make adjustments. These kinds of fixes are what we are trying to deliver. As part of our Mac team I promise that we are listening to the feedback from our clients and building from that. We are currently working on a 9.0.2 build that will help protect our clients even better. I have been running it against sample feeds that our competitors are not able to detect and we are catching them everytime. If you ever have feedback or ideas for the client please do not hesitate to message me directly and I will be happy to provided you with any information I can. I am not only the Threat Research analyst but I assist with QA and the Development process to help build out a better product and provide feedback from the field to our team.
I absolutely love the SecureAnywhere as a whole, and I do hope that the OS X agent versions and their interaction with the console and it's policies come into par with the PC version.
What is the reason you think why apple builds out the list of known puas and keyloggers in plain text?
I'm very interested in knowing more about this as will another one of our company admins. Is there more explanation or documentation on this somewhere regarding this?
I got a feeling one of my company admins would like to hear/know more about this.
Anyway, thanks so much for all the explanations and your time. Really appreciated.