Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,606 Replies
I just can’t say enough bad about Webroot. I blew it away two years ago because of all the problems and lack of support. So here I am two years later and am still being haunted. I uninstalled it from all my endpoints but it did not remove itself from SecurityCenter. It is still in the WMI. That really doesn’t surprise me. It is obvious that Webroot has no business getting in to the virus arena but anyway….. is there an automated way to remove the Webroot entries in the WMI?
Hi All,Good Day. I am looking for a solution on Webroot EndPoint Protection CE 21.4 Client which allows me to temporary allow a client machine to open settings> Advance settings and change the schedule time. Once user sets the schedule time as per their requirements, I can again revoke access for client machine. Currently when user tries to Open webroot from notification are, they get the message “You don’t have permissions, contact your system administrator” Somewhat like that. Thankyou!
So were to begin. we have multiple clients that have webroot installed on DELL AIO pc’s are the majority being used on daily basis however in light of certain DELL updates that have to be done manually at this time Team is finding it increaseingly difficult upon boot to wait and sit for WEBROOT to stop pegging out the main disk drive with read and write scanning anything in the background running on startup which there is not much to scan until a user starts using their PC for daily use. noticed in task manager that DISK usage is pegged making anything on the DELL AIO inoperable to use. what is good way to keep this from happening besides disabling the end point service form the mywebroot management dashboard, then rebooting there by uninstalling it from the machine do our work then reboot again to reinstall it. management dashboard CE 21.4 and webroot end point version - 188.8.131.52 is client versionplease advise.
HiI have had console alerts setup to notify me of Threats and Installs for 3 years but in the last 6 months I have not been sent notifications for detected threats or installs on all bar one occasion where I received it 24 hours after the fact.It used to all work instantly.I have raised this with support now and in the past and not got very far. Is anyone else experiencing this issue and if you managed to fix it how did you do so?Thanks Bill
For SOC Compliance, we need to have a evidence of our policies. Currently the work around is to just take screen shots, but this is very tedious and inefficient.I see there was an older thread, however that answer does not apply to the current UI.We currently use the CE 21.4 version, is there a solution to be able to export the policies? (I tried through the reporting tool, but I do not see the option there as well...)
@freydrew @Rob House In the live Q&A post about the new console, you said that friendly names would be shown from the old console but functionality did not yet exist to rename in the new console.I’m disappointed to tell you that friendly names are NOT being shown in the new console. This is going to make management very difficult. Is this a bug that you’ll be fixing soon?REF:
This link mentions that Secure Anywhere Endpoint Protection can “Lock down ports and devices such as USB, CD and DVD Drives” - We’re looking to possibly wanting to lock down USB Storage devices from being access on our machines. How/where can I configure this in our Webroot Policy? http://wrpolska.pl/wp-content/uploads/2013/01/WSA.pdf
Hi all,I am fairly new to webroot management. I want to know if there is a possible way to find out the history of updates on the webroot software for end users device as well as for the updates on the admin portal. I have access to webroot admin console. Any suggestions are helpful.Thanks.
MSP here. I’ve seen other posts that discuss Webroot with Windows Defender, but now that it’s 2021, Windows 10 has changed a bit.Why other posts don’t apply anymore: Disable periodic scans in Windows Defender is no longer an option According to this article, you can set a DWORD value in the registry to enable Passive Mode for Defender, however, upon setting it, is has no effect on issue #1 belowTwo issues:With Webroot + Windows Defender enabled, Windows Defender is still actively scanning data in real-time. I ran a test and saw the Microsoft Anti-Malware service spike up to 30-40% CPU usage. Webroot is installed and functioning correctly, but Webroot doesn’t seem tell Windows Defender to turn off. I have a registry hack to force Windows Defender off, but I’d rather not apply that unless I have to. In addition, if I disable “Real-time Protection” in Windows Defender, I get a toast message that says that Windows Defender & Webroot are both disabled, even though Webroot is actually
My alerts and any details I have been able to find in the console all refer to paths with variables that are not resolvable. Is it possible to get the full actual path of malware rather than it showing with variables like %appdata%??? The problem is I do not know which user so I cannot determine the path and more importantly who. This is an example of the issue. Who's appdata? Threat List: APPLICATION-C2A064D9174E0B78AFDA.JS, W32.Trojan.Lisp.Autocad, %appdata%microsoftwindowsinetcachelowie4lldmwe4, [url=http://snup.webrootcloudav.com/SkyStoreFileUploader/upload.aspx?MD5=F239541E10FEF69C6D9AFCD7D897AD58]http://snup.webrootcloudav.com/SkyStoreFileUploader/upload.aspx?MD5=F239541E10FEF69C6D9AFCD7D897AD58[/url] F239541E10FEF69C6D9AFCD7D897AD58,
Looking for evidence/story/anecdote where this feature successfully blocked something malicious. The feature looks intriguing, but we’ve had enough webroot problems with their basic features and I’m hesitant to introduce what looks like a beta still without a known upside.
Hello, Is there any way to control what applications are listed under application protection from the web management portal? We’re looking into this because lately we’ve had quite a few clients being unable to open chrome because webroot is stopping it from opening, and we can’t figure out what is telling webroot to put the chrome exe under app protection.
I would like to see the machine names displayed without being truncated to 15 characters. Glib comment: That is so 20th century.Seriously though. And when you pull a report, the report also shows the truncated names.Thanks for listening!
Hi, Is it possible to have something like a “MSP report“ instead of a report för every Site in Webroot?It would be much helpful if the reports could report several/all sites with information per Site.It’s tidious to have 1 report/site and the go throw these 1by1,Some Summerizes Reports would be very helpful...or maybe im missing something here?
Hi,I need to remove or disable webroot for an upgrade of the computer. The error is to please contact your network administrator, to access the user interface.Problem is the software was installed by a another company who is no longer administering the computer and we are unable to contact them so they can disable it.Can the Webroot just be uninstalled, or is there another way to open the programme. Its still active so we may as well use it if we can, but we need to setup white lists as well.Thanks
Webroot has effectively shut down O365 for my whole organization by blocking the login page.It doesn’t matter which way we approach, eg. “portal.office365”, “portal.azure” it’s when you get to the login landing you are met with: Warning: This is a High Risk SiteWebroot has blocked the website you are trying to access for your protection:https://login.microsoftonline...Detected Phishing SiteThis site might try to trick you into disclosing your login, password, or other sensitive information by disguising itself as a website that you trust.
I just wanted to share my own recent experience with uninstalling Webroot Business Endpoint Protection which has received a number of questions over the years and hopefully help someone out. This is the process that I’ve had success with and does require that your agents are checking into the Webroot console and your RMM tool (mine is ConnectWise Automate)Adjust your policies so that agents check in as frequently as possible Tag the target agent(s) with the “unmanaged” policy. For off-boarding, etc., I use a separate group with the Unmanaged policy applied and just move the agents into that group and apply the new policy. Allow them plenty of time to check in and get the policy update. Issue the Uninstall Agent command from the console. We’ve had about a 90% or so success rate with this command. Some will report that the command has executed, but continue to check in. For instances where the console uninstall doesn’t seem to take, we then jump to our RMM tool for help. I stopped using
Already have an account? Login
Login to the community
No account yet? Create an account