Got a Question?
Have a product question? Start here!
- 548 Topics
- 2,343 Replies
Hello, Webroot Community.I run Webroot utilities every morning in order to keep things clean on my Windows 10 (Dell) desktop PC.I click on the Save Report button, which saves the report on my desktop. I’d like to configure Webroot to place the report file into a folder which I specify. Please offer suggestions. Thanks.
The Optimizer program runs all the time and leaves many message blocks on my computer that have to be deleted, saying the program is being run and will finish shortly but it never does. I cannot get it to stop this even though I removed Webroot from my computer and reinstalled it. I am using Windows 10 and it is driving me crazy.
Bit of an odd one. Any new computers that I install 19.43 agent on for the first time then get blocked for remote access on the domain. Remote desktop still works but for example navigating to C$ doesn't, neither does the internal VNC. This also blocks it from seeing WSUS or from my deployment software (PDQ) being able to deploy to it. Further, it won't remove Webroot from the web panel, almost certainly related to the fact that the admin share can't be accessed. Any systems that had 18.44 and then updated to 19.43 are fine.
We are in the process of installing Webroot on our network. We have some shop PC's that I have it installed on but they are not reporting to the admin console that it is installed. They are not reporting becasue they don't have internet access. What they do have is access to our company exchange servver to have email. So accessing that email server on our local network then opens up the possiblility of them getting something dangerous in an email. What hole do I need to open in my firewall policy so those PC's can report to Webroot's admin console and get policy settings pushed to them?
All, We have commenced with main WSA 188.8.131.52 Business deployment with an initial rollout to 200k devices. If the feedback is postive , then we will deploy to everyone else. Regards, Jonathan.giffard Senior Product Manager WSA Business
We do lots of work with remote networks that use a VPN for connection. I've noticed that when we do utilize a slower VPN, the PC performance goes to crap. Everything, even the simplist things such as right-clicking a file, or opening an RDP file take extra long, but it almost seems a bit random. If I shut-down WebRoot protection, performance returns. I can only assume WebRoot is trying to route traffic through the VPN, but the fact that there's such a slowdown, just simply because the network connection is poor is a bit concerning for me. Is there any way to tell WebRoot to either delegate to the base network connection, or potentially hold off on much of it's network activity when a VPN app or network connection is established?
Twice in two days I've had customers with Webroot installed call because they opened a Web page that displayed some kind of virus alert. Their browsers were locked (unable to be closed normally) but I was able to close them using taskkill. Their computers were otherwise unaffected (as far as I can tell, and I did take time to review them both). Is Webroot supposed to intercept that kind of activity? If so, it didn't work in these two cases, although nothing else malicious ran on them (again, as far as I can tell). Would some forensic information help to defend against this sort of thing? If so, I should be able to collect information from both computers.
When I sort by "status" or "last seen" in group management with a site that has 50+ endpoints, the sorting only applies on a page-by-page basis. For instance, when I sort by status, an endpoint on the second page that "needs attention" will not show up at the top of the first page, but instead will show up at the top of the second page. The sorting applies to each individual page of 50 and doesn't re-sort the whole group of endpoints and re-order them. Example screen capture: [url=https://www.useloom.com/share/8a5f015ec1ae45c98c31fead6488bf68]https://www.useloom.com/share/8a5f015ec1ae45c98c31fead6488bf68[/url]
After recently terminating a 3rd party IT support service they sent a remote consol command to remove their remotely managed Webroot Secure Anywhree from our network (45 workstations & 5 W Std 2102R2 servers). Although the console shows from their end that all agents were deactivated and uninstalled, that is certainly not the case. The next day, completely unaware the failed uninstall attempt occured, I came in to find all 5 W Std 2012 r2 servers c: drives completely full. I then discovered the reason was Webroot created a WRLog.log file in c:WindowsTemp directory that expanded exponentially until maximum storage space was depleted. After contacting a support tech from the IT mgmt service we were finally able to stop the service, delete the expanded WRLog,log file and then manually uninstall the agent from the cmd line for all of the servers. The following day, the problem started all over again and I had to go through all the steps to delete the temp log file once aga
When I cold boot my Win 10 system, I note a new desktop shortcut for “Webroot” - whose link is to open a file “C:\Programs\ShellExtension.dll. Every time - despite my deleting the shortcut before shutting down. What’s worse, as part of the bootup process, I always get a pop up box “ How do you want to open this file? Internet Shortcut ShellExtension.dll .”How do I prevent the shortcut creation and the bootup message? Many thanks. Peter
Hello,First of all, I apologize in advance for my English.I am writing you to ask a question that seems very important to me.We often hear about companies and hospitals (for example) that have been hacked, or whose data is subject to ransonware.Is it possible to have information or maybe even a list of the security solutions that were used each time?For example, I would like to know whether Webroot has been able to protect its customers better than others?And which security solutions have failed the most?Some will answer that each case is unique and that everything depends on the configuration and the chosen parameters, but I would like to disregard this fact and just consider the automatic and pro-active effectiveness of the abovementioned security software.
I don't use password managers. Today one of my webroot-protected computers has a red exclamation point in the system notification area, and the webroot app says all is well except "Action Required: New Password Manager". I can't find any way to make it happy (short of signing up for password management, I suppose).
Hi Team, I am coming from a McAfee EPo and ESET solution to a webroot solution. I am using the “Management Console - CE 22.4” to setup a range of Windows servers. I have a few questions: 1: Can we set the on access scan to “scan only on write” not read.2: Should we use file/folder exclusions?3: Is there a live scanning monitor to see what is being scanned at any time - this will test what should and what should not be scanned? We also have seen that when we do a remote desktop to a server, the scanner activates and the CPU increases. Thanks Phil
I was looking into the reports and was wondering a couple things: 1. Can we generate non-graph reports? Something with text detailing type of threat discovered, when it was identified and when it was removed? 2. Adding a company logo to the title screen. 3. Modifying the format displayed for current reports. ie: instead of showing 1 report per page possibly show 4 reports per page? Regards, Matt
Hi: This morning I opened Internet Explorer like I did yesterday and everyday ( I know, that's my first problem, but hey, I need to know what happens when my customers do these things ) and Webroot popped up and said that C:Program Files (x86)Internet ExplorerIEXPLORE.EXE is trying to connect to the Internet and is not trusted. I clicked on Allow Always, but what should I tell my customers when they ask why Webroot does that? Thanks, TimC
Could use an explanation here. Thanks in advance. I'm trying to determine the best settings for mainly web browsers, but I'm a little confused as to the options and combinations of each . My options are as follows : Protect, Allow or Deny with combinations of 2 of the 3. It seems I can choose 3 different scenarios. I can select [b]Allow/Deny[/b], [b]Protect/Allow or Protect/Deny.[/b] Given these explainations for each below, unless I'm misunderstanding something how would it possible to have have an application both under [b]"Protect"[/b] and [b]"Allow"[/b] at the same time? OR, an application set to [b]"Allow"[/b] and [b]"Deny" [/b]simultaneously? As I stated, I must be misunderstanding the explanations. [b]Protect.[/b] “Protected applications” are secured against information-stealing malware, but also have full access to data on the system. You might want to add financial management software to the category. When yo
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.