When we release a version update, it is load balanced across our global user base. As such, it can take up to 72 hours to apply to all endpoints.
Fixed
- Bug fixes.
There are some exceptions in place to resove this but there isnt much that we can do about it because Apple thought it was a good idea to put a list of puas and keyloggers in plain text for the system to read. The detection that you posted should no longer happen. One other thing to consider is not scanning your time machine as there isnt anything that can be done with any file found in it by WSA. The files located on Time Machine are locked by the os and require much more to remove. Best setup for scanning on a Mac is to not scan mounted drives as the Real Time Shield will catch anything trying to run anyway.@ wrote:
Here is one example:
Info.plist, Keylogger.SpectorPro.r, VolumesTime Machine BackupsBackups.backupdbSimon's MBP2016-04-06-025514.inProgress7051187E-C23D-40FD-8A68-4FB40DB72C30Macintosh HDSystemLibraryExtensionsAppleKextExcludeList.kextContents, 00000000000000000000000000000000, 6 hours 30 mins 29 secs This continuously breaks the Time Machine backups to an external drive.
We detect plist files on purpose, i am curious what you mean.@ wrote:
"Bug Fixes" is a bit vague.
Have they fixed detecting all sorts of plist entries as malware?
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.