Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,137 Topics
- 3,618 Replies
How Do You Handle Irrationality with a User?
So I'm curious to know what everyone else thinks about the subject. We all encounter users who cannot be reasoned with, no matter how hard we try. What do you do to handle those users? I wrote an article on this very topic: [url=http://www.thanksaj.com/2014/07/encountering-irrationality-its-when-not-if/]http://www.thanksaj.com/2014/07/encountering-irrationality-its-when-not-if/[/url] Please let me know what you think of it and also we can discuss the topic in general here! Thanks,
Webroot is completely ineffective for ransomeware?
We have a client whom seems has been infected on 3 seperate occasions with ransomeware that webroot simply does not see or protect against. No alerts, using recommended default policy plus marking potential apps as threats, with not one alert or peep. My client has to call me and tell me when it happens.. Do I need a different antivirus protection or should I be turning on a setting. So far, recomending webroot has been embarrassing, but who knows if any other packages would pick it up
My friend ran a "Cracked webroot"
So my friend was trying to get a webroot subscription he had showed me this “free webroot cracked” lol just another key basically but he’s afraid now because he found out that you can basically do things to people’s computer from “endpoint” as its called, what can he do to prevent his computer from being damaged?Didn’t really know where to post thisAlso I told him to try uninstalling the webroot, so they cant run anything to the computer (I think)
How long does it take for upgrading?
I see a new version for Mac has been released since 8 days, a new version for Windows has been released since 17 days. However, all agents in my clients are stil the old version. Mac is 18.104.22.168 Windows is 22.214.171.124 I know they said not everyone will receive the update at the same time, but one or two weeks should be enough? Any problem with upgrading?
WebRoot installed and Running but not listed in "Programs and Features"
Within the console I deactivated a Server and Client PC to trouble shoot issues. Both have been reactivated and had the installer run. Both show Webroot running in the tray and services but neither have Webroot listed in "Programs and Features". I have uninstalled from the console and reinstalled. Have disabled and reenabled show in Programs and Features within the policy but haven't been successful in getting the program listed. I need the program listed for software inventory scanning. Server 2008 R2 and Win 7, WR Ver 126.96.36.199. Thanks for your help, Jetson
BSOD Win10 and wireless keyboard/mouse
Last June I experienced a BSOD with a number of customers running Win10 and a Microsoft wireless keyboard/mouse. The solution was to change Identity Shield Settings to Compatibility Mode ON. With recent Win10 updates the problem is back. I believe it is the KB3194496 update, but I'm not positive. At any rate, the Compatibility Mode ON no longer resolves the issue and I have to use a wired keyboard for these clients. Has anyone else experienced this and do you have a solution/work around? Thank you!
Webpages do not display correctly
I have noticed that since I installed webroot, when i either type in a URL or do a search and click on a link web pages do not always show the flash, so no images and no video. Somethims I have to hit the back and then the forward button a few times to get it to show. Other times I have to close the web browser all together and re-open to get the web page to display everything correctly. Has this happened to anyone and if so do you know a simple fix. I am sure all I need to do is turn off a policy or something but I have thus far been unsuccessful and finding out which one. Any help would be great. Thanks, VericomITGuy
Overrides before Webroot identifies as virus
Hello, I create serval scripts(in AutoIT) that allow me to automate deploying updates to my users, or gathering info, ect... Every script I create gets flagged as a virus. My question is, is there a way I can create an override before I deploy the software and get a message that there is a virus? Thanks for your input. Rich
Webroot Interference with Microsoft Office documents
Greetings Webroot Community! I wanted to share a recent issue that we have been experiencing with some clients that use both Microsoft Office products, and Webroot Business Endpoint Protection. Recently, some of our users have reported that when they are trying to edit and save documents in Word and Excel they experience a pop up that advises them that they cannot save their changes because “another user” currently has the document open. We tried several different ways to get this error to go away, however each time we have had to uninstall and reinstall the Webroot agent on the client machines. Our working fix for the issue is to deactivate protection in our RMM portal, on the endpoint in the management console, and then uninstall the agent on the system locally through a windows command window using the following command: “C:\Program Files (x86)\Webroot\WRSA.exe” -uninstallWe then reactivate protection through our RMM portal, allow the agent to reinstall, and sign out and back into t
? How to start a program remotely using the Agent "Run a DOS Command"?
Hi all. I need to start remotely an application, so I figured that I could do this using the "Run a DOS Command" from the Agent commands. Well, I run the command I want but nothing happens to the endpoint I target. For testing purposes, I tried to run the command "notepad.exe". Although the command is shown as executed, the notepad never opened at the endpoint that I sent the command. Same happens even if I put the full path of the executable. What I am doing wrong? How can I start an application remotely? Thank you in advance.
Webroot web console - can't get to any sites
Can login, but when I click on any site to manage it, I get kicked back to the login screen. Have tried Chrome and IE both, at different times. We are an MSP and my techs say this is a problem for them too, just depends on the day/time whether they can get in. We have opened a ticket with Support at least two weeks ago, and nobody has contacted us. This is a big problem as we can't manage our customers AV.
W32.Trojan.Gen false positives
All of the sudden, webroot reported W32.Trojan.Gen on my database server and shut off access. I ran another scanner and it reported all was well. I uploaded logs to Webroot. There appears to be no one I can speak to and I have no idea if Webroot knows what is going on with my Production server. I'm strongly thinking of manually overriding. Any ideas?
i have a security concern/question that i'd like to check with some sercurity experts on this forum. I have an AD enviornment here and i'm considering disabling UAC via GPO to help resolve some minor issues with users accessing network shares. I've read on more than one occasion on the internet recommending disabling UAC to solve one problem or another and not necessarily my particular problem. I'm worried about the security hole that I might open and that i may regret later. So, trying to find that balance here in this enviorment. any tips/advice on this matter is appreciated. i can provide further details on the issue i'm trying to clear up if interested.
How Do You Drive Traffic?
So the link to my site is in my signature, but it is, again, [url=http://www.thanksaj.com]http://www.thanksaj.com[/url]. So it's a fairly new site. I'm looking for ways I can drive traffic to the site. I am posting links on various websites, such as Reddit, Facebook, via Twitter and on several tech communities, including this one. However, I'm wondering if there are any other techniques I should consider employing. Reddit has been marvelous so far! However, I want to spread this site far and fast! Any help is greatly appreciated! Thanks,
How to track threat disposition for an agent from GSM
Deployed several agents in multiple sites. When a threat appears and then goes away (seemingly by itself), how do you know what the disposition of the threat is (e.g. some AV would indicate is it is in quarintine or deleted at least from the agent GUI). If you are managing via GSM, how do you know the disposition? Is there a log that can be retrieved from the agent? By GSM?
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.