Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,648 Replies
So I maintain a website that writes articles for IT Pros, but especailly those new to the field. I wrote an article that I thought woudl be a worthy share. Please, if you like the article, leave a comment on the site! [url=http://www.thanksaj.com/2014/08/introspect-on-infotech-network-cables-network-yourself/]http://www.thanksaj.com/2014/08/introspect-on-infotech-network-cables-network-yourself/[/url] Thanks!
[b]Comment: Interesting question why women are not attracted to IT professions???[/b] [b]=================================================================================================[/b] By Lynne Y. WilliamsJuly 30, 2014 08:04 AM ET Computerworld - IT is a growing profession, and one that requires skills that women not only possess but oftentimes excel at. And yet [url=http://www.computerworld.com/s/article/9250053/www.computerworld.com/s/article/9243700/Jonny_Evans_Technology_is_sexist]women remain a distinct minority within the profession[/url]. Why is that, and how can it be changed? Computing should be an attractive field of study for anyone. Nonetheless, although recent Bureau of Labor Statistics findings show that computing-related jobs are growing at a rate almost double that of all other fields, fewer students are enrolling in computing majors. That trend led the BLS a few years ago to project that by 2018 approximately half of all jobs requiring extensive computing ex
So the link to my site is in my signature, but it is, again, [url=http://www.thanksaj.com]http://www.thanksaj.com[/url]. So it's a fairly new site. I'm looking for ways I can drive traffic to the site. I am posting links on various websites, such as Reddit, Facebook, via Twitter and on several tech communities, including this one. However, I'm wondering if there are any other techniques I should consider employing. Reddit has been marvelous so far! However, I want to spread this site far and fast! Any help is greatly appreciated! Thanks,
So I'm curious to know what everyone else thinks about the subject. We all encounter users who cannot be reasoned with, no matter how hard we try. What do you do to handle those users? I wrote an article on this very topic: [url=http://www.thanksaj.com/2014/07/encountering-irrationality-its-when-not-if/]http://www.thanksaj.com/2014/07/encountering-irrationality-its-when-not-if/[/url] Please let me know what you think of it and also we can discuss the topic in general here! Thanks,
Some folks over in the /r/sysadmin subreddit are putting together this site to help combat burnout: [url=http://burnout.io/]http://burnout.io/[/url] More details [url=http://www.reddit.com/r/sysadmin/comments/2740j9/burnoutio_help_us_build_a_resource_for_the_it/]here[/url].
Happy [url=http://www.sysadminday.com/]Sysadmin Day[/url] to all the sysadmins out there! For those of you who aren't sysadmins, who forgot to get a cake or a card, you can [url=http://www.spiceworks.com/itcards/]send an e-card[/url] to your sysadmin here.
The Register has an article this morning about a new form of malware that maintains infection on machines and steals data without installing files. The malware is persistant through even after reboot. The malware resides in the computer registry only, yet isn't visible using RegEdit. Anyway, is webroot aware of this new malware and can webroot protect against it? The Register's article is here: [url=http://www.theregister.co.uk/2014/08/04/registryinfecting_rebootresisting_malware_has_no_files/]http://www.theregister.co.uk/2014/08/04/registryinfecting_rebootresisting_malware_has_no_files/[/url] Gdata Security Blog on it: [url=https://blog.gdatasoftware.com/blog/article/poweliks-the-persistent-malware-without-a-file.html]https://blog.gdatasoftware.com/blog/article/poweliks-the-persistent-malware-without-a-file.html[/url]
We are preparing a new base image to be used with XenDesktop 7.5 personal vDisks. Should the webroot client be installed on the base image, or within the user's personal vdisk via GPO? If installed on the base image, would the -clone or -uniqueid switch be used?
the original IT guy who setup our webroot is no longer here. im trying to find out where in the settings the area of email notification of infections are. ive noticed webroot will send multiple emails even after the infection is gone it seems. its also opening tickets within spiceworks each time there is an infection even after there gone. highly annoying!
Recently we are seeing that new installs of Webroot are refusing to run a scan and set there indefinitely. It doesn't happen always but the amount is increasing. The endpoint has to be manually uninstalled and re-installed. This makes deployment through automatic means like scripting very difficult as we don't want to have to individually check hundreds of Endpoints. We are seeing this across multiple customers with different network infrastructure. Yes, we have raised this issue with support, but the answer is always uninstall/re-install. I think there's more to it than that this time as the instance is increasing which makes me think that there is maybe a problem with the latest version of Endpoint? Cheers.
Hi, We have an issue similar to [url=https://community.webroot.com/t5/Ask-the-Experts/File-named-C-Program/td-p/77475,]https://community.webroot.com/t5/Ask-the-Experts/File-named-C-Program/td-p/77475,[/url] however we are seeing this on servers that are being managed centrally. Is the workaround the same, or is there something different that needs to be done, as I can't shut down WebRoot from the system tray?
I was wondering if someone can guide me in the right direction to find more information about a Threat once it has been found. Does Webroot keep a list of all the threats detects (with a brief description of each and what it does) or do you just have to Google the Filename or Malware Group to find out more information about the threat? I have been searching the forums but can't find an answer. Thanks.
Hi. I run a website called [url=http://www.eldersofgenova.com/]Elders of Genova[/url], which we launched last Saturday. Google is still indexing our pages (we have thousands of them), but the few that are turning up in Google searche results have an orange exclamation mark, not the green check mark everyone wants to see on a website they're unfamiliar with. What do we need to do to earn that green check mark? Thank you very, very much for your help!
Hi Guys First of all I need to say that policies and overrides import/export are both great functionality, so thank you for that. But I need some clarification before I start to use them. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/11940iC32153CD961BAAD4.jpg[/img] I prefer to make sure so can you explain me exactly how those three options works and what happened with my old overrides when I choose one of them. Especially first one - what overrides are "redundant" for Webroot? Best Regards and thank you for response
[b]HP Launches Helion Cloud Platform for Government[/b] by Jeffrey Burt A brief summary: [i]The solution builds off HP's larger efforts in the cloud, including the $1 billion being invested in R&D.[/i] Hewlett-Packard is rolling out a private cloud offering for government agencies that is based on the Helion cloud platform the tech vendor announced three weeks ago. HP's Helion Managed Private Cloud for Public Sector is designed to give governments on all levels—federal, state and local—a managed and dedicated private cloud solution that enables them to create a shared service model across multiple departments, with the agencies essentially playing the role of IT brokers. The agencies can manage and monitor the use of resources via a Web-based portal. The technology enables the cloud platform to rapidly scale, direct services to their users and effectively control costs by letting agencies pay only for what they use. The Helion solution—a highly automated private
Hi Guys [url=http://www.spiceworks.com/news/press-release/2013/11-26/]http://www.spiceworks.com/news/press-release/2013/11-26/[/url] What sort of ability admin get in Spiceworks IT management platform to manage WSA? The same as in the WR console or minimized? And if so, how much minimized? Best Regards Sebastian Ambros
I finally had some time to look at WSA and Webroot Endpoint protection and I have to admit that I'm really excited about the product. Like I said I still do have some questions: [list=1] [*]Logfile:There are some informations in the WRLOG.log which I don't understand or can't relate to anything: [524832/0000001D] [(null)]; [Flags: 00001000.0]; Type: 3 (4661) [*]Rollback/Journaling: Where can I find out what applications and which application objects are getting journaled? And can you manually do a rollback or extract data from the journal? [*]Monitoring: How long are unknown processes monitored? Let's say I've got a self-made script which won't exist in the wild; will every change by this script get monitored forever(without whitlisting it)? [*]Firewall: Does the WSA firewall only work in combination with the Windows firewall? And is the firewall compatible with a proxy server? [*]From what I read WSA also includes a webfilter; can we manually block websites? [*]During my test I notice
My Master Life Coaching client, brought her hard drive to me, and asked to work on her website with my help. Then after jumping her hard drive into my desk top with an adapter, my desk top had 8 threats. Here are my questions. Is it likely the threats were from her hard drive, or from go-daddy website builder? Is there any threat that our websites may be contaminated; and if so how can I check, or treat the threats so no one gets boobie-trapped just by going to our sites? (mine is through vistaprint)
CryptoLocker Malware: What you still need to knowKnowledge Base
[h3]What is CryptoLocker?[/h3]CryptoLocker is most often spread through booby-trapped email attachments and uses military grade encryption. The malware can also be deployed by hacked and malicious web sites by exploiting outdated browser plugins. [h3][url=http://images.saas.webroot.com/Web/Webroot/%7bd4d3ba36-c6b8-43f7-944e-19c486dbcd31%7d_Cryptolocker.pdf][b]Webroot's Threat Brief on CryptoLocker[/b][/url][/h3][b] [/b] [h3]Can Webroot Protect Customers Against It?[/h3] Encrypting ransomware (Cryptolocker, CTB Locker, Crtroni, Cryptowall, ect.) is a very difficult infection to remediate because it uses the RSA public-key encryption algorithm to encrypt user files using unique encryption keys for each computer. Once a user’s files are encrypted this way, it is next to impossible to decrypt them without access to the private key that is stored on the remote servers in use by the malware author(s). There are no tools currently that are capable
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.