NOTICE: Endpoint Driver Issue with Virtualized Windows 2016 Servers

  • 7 December 2017
  • 1 reply
  • 34 views

Userlevel 7
  • Retired Webrooter
  • 1376 replies
Issue: Windows 2016 running as a virtual guest in VMware or Hyper-V with our Web Threat Shield driver enabled may experience a BSOD intermittently.
We have seen a very low level of occurrences and are offering this workaround whilst we continue to research and analyze the small number of cases seen and patch this issue.
 
Action: Webroot recommends that if you have servers running Windows 2016 as a virtual guest in VMware or Hyper-V, with our Web Threat Shield driver enabled, you should take action to deploy the workaround.
 
Workaround: Prevent Web Threat Shield URL driver from loading by: 
  • Using your GSM/EP Console to change the default (or current) policy used by your Servers, so that the Web Threat Shield policy rule > Enable Web filtering Driver = Off
 
If you do have any further questions or concerns, please contact the Webroot Support Team.

1 reply

Userlevel 7
Badge +48
UPDATE
 
With the release of Web Threat Shield 1.6.0.13 this issue has been resolved. 
 
Updated: 
  • Improve detection of Install/Uninstall/update supported browsers.
  • Support for Puny code URLs.
  • Whitelisting now performed with certain Arabic characters.
Fixed: 
  • Fixed base64 encoding/decoding for Mozilla based browser extensions.
  • Whitelisting URLs with non-latin characters fixed for IE.
  • Disable/uninstall driver on WinServer 2016
  • Fixes for accessing IMVU.
If you do have any further questions or concerns, please contact the Webroot Support Team.
 
 

Reply