Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,656 Replies
I am using OS 10.13.1. When I shortcut between applications (Command + tab), the webroot icon is always one of the apps that appears as an option, along with, let's say Word, Firefox, whatever else I happen to be using. I never go to Webroot, so this is a distraction. How can I prevent it from appearing? (Just to be clear, I am not talking about the menu bar or the dock. I'm talking about a temporary window that appears when I'm using this very common shortcut.) Tx.
For reference, I detailed here: [url=https://community.webroot.com/t5/Security-Industry-News/Chrome-Releases-Stable-Channel-Update-for-Desktop-Tuesday-March/m-p/315569/highlight/true#M40391]https://community.webroot.com/t5/Security-Industry-News/Chrome-Releases-Stable-Channel-Update-for-Desktop-Tuesday-March/m-p/315569/highlight/true#M40391[/url] I am seeing a real issue when the new Chrome v65 combines with the Chrome web extension. I have opened a ticket, but I want others to be aware, as well as chime in if they are seeing the same issue. One of our HTG partners mentioned an issue, and I decided if to see if I could replicate it, and found I could. I would highly recommend not using the extension at this time based on what I have experienced.
Hi, I saw article [url=http://securitywatch.pcmag.com/security-software/326903-mac-antivirus-test-reveals-winners-losers]http://securitywatch.pcmag.com/security-software/326903-mac-antivirus-test-reveals-winners-losers[/url] in the internet. Webroot noticed last place in this benchmark but cause of this was a bug. About what bug are we talking about? Someone knows more about this? I will be grateful for some informations about it. Best regards.
Dear, In the console of webroot for business there is an option to activate the web shield. Can somebody explain me how this is working? Will there be an addon installed in the browser? Is there any check on a search or website you try to access? thank you!
Hi, We use a program called CopiTrak by a company called Nuance ([url=http://www.nuance.com)]www.nuance.com)[/url] to track printing for billing purposes in my company. It's worked well for the past several years but now we've discovered that Webroot breaks it, and interferes with it's ability to intercept print requests. I've had a tech from their company working on the problem and he confirms it's an issue with Webroot, but since I can't exclude any programs, I'm stuck. Any suggestions?
Hi, Who do I contact within Webroot in order for them to take a look at our GSM policies etc.. to ensure that they are in good order? As part of our companies internal auditing this summer, we have to provide a clean bill of health or recommendations on what we need to do to improve our security policies, and Webroot is on that list. Thanks John
I am a sysadmin for a medical group and tried "webroot" on 3 test machines.. While initially happy, their are a couple game stoppers... "waiting for webroot extention" absolute disaster.... The 3-6 second delay is awful.. While it may not sould like much, some of our machines must bounce around insurance sites at a rapid pace and I had insuracne billers light fire to my office over this... Secondly, stopping it was not exactly what I would call intuitive.. Finally uninstalled webroot (did not kill off this issue) and then killed off the extension in Chrome.. (two step process? does not seem quite right but I could not find any documentation on this).. Lastly... while I can appreciate security, wtf is this security code thing on logon? really? while I do not mind secondary layers of security, lets try to stick with something already established and working? Really silly SNAFU's but I have my hands full
Recently we are seeing that new installs of Webroot are refusing to run a scan and set there indefinitely. It doesn't happen always but the amount is increasing. The endpoint has to be manually uninstalled and re-installed. This makes deployment through automatic means like scripting very difficult as we don't want to have to individually check hundreds of Endpoints. We are seeing this across multiple customers with different network infrastructure. Yes, we have raised this issue with support, but the answer is always uninstall/re-install. I think there's more to it than that this time as the instance is increasing which makes me think that there is maybe a problem with the latest version of Endpoint? Cheers.
Hi, I've installed Webroot on over 20 of our clients in the office and everything works except for 2 users. their internet connection will only work if I place them in "silent audit". How can I get them to work on the default policy. What is the default policy interfering with? we've looked at poroxy settings, firewall settings etc and nothing has come up. Thx
More than 55,000 new malicious software programs are registered [i]each day [/i]by AV-Test an independent antivirus (AV) research institue. Any one of these can have a mild to devastating impact on the organization, randing from wasted IT staff hours to damages to consumer confidence or losses of dollars in the instance of a regulatory violation. In fact, the average organization experiences a malware attack every 73 days, Osterman Research found in a 2011 study, in which 44% of participants said that a single malware attack had cost them as much as $10,000, while another 27% reported financial impacts as high as $50,000. Too few IT decision-makers address malware threats adequately, chalking up security breaches as a cost of doing business, the researchers noted, adding, "The costs [of malware] are typically higher than many organizations realize, but with the right knowledge and technologies, it is possible to reduce the impacts of malware." Canalys Research has likew
Hello, My client and I are concerned about the MODERATE RISK ICON(s) next his site in search engine results. Besides being a fairly new site what are reasons behind it and what can we do to upgrade his status to TRUSTWORTHY? URL: saratogaproxy.com Thanks in advance Karl Bischoff
So I guess we've seen this file before right? [url=https://community.webroot.com/t5/Endpoint-Protection-and-GSM/File-named-C-Program/m-p/77475#M3612]https://community.webroot.com/t5/Endpoint-Protection-and-GSM/File-named-C-Program/m-p/77475#M3612[/url] But I've seen it again on another system now, and when I called support I couldn't seem to get a straight answer as to what's calling it. Best theory I got so far was perhaps an update rollout is doing a reinstall which might cause it, since it does seem to happen on install. I'm just trying to decide how concerned I should or should not be. Thanks,
[url=http://www.reddit.com/r/sysadmin/comments/24mruf/79_percent_of_it_administrators_want_to_quit_due/]http://www.reddit.com/r/sysadmin/comments/24mruf/79_percent_of_it_administrators_want_to_quit_due/[/url] Does that match with your experience? Are you in the 79 percent?
We just got our first client that has more than 1 or 2 Macs. We put SecureAnywhere on 14 of them, and since then, multiple Mac users report that their Outlook freezes several times a day, and they have to force quit and reboot their machine. Some of these users have very large mailboxes in 365. The user who called it in her mailbox is 49 Gig. I figured that it might be hanging when webroot is scanning the offline cache file, so I went to create an Override for the path ~/Library/Group Containers/UBF8T346G9.Office/Outlook/Outlook 15 Profiles, but when I click Path/File to install the Overide, it says endpoints must be running version 9.0.1 or higher. The Mac agents that I just downloaded 2 weeks ago are version 220.127.116.11. So #1, is there any wasy for me to exclude the Outlook cache folder on a Mac, or #2, is there any other known issue that I did not find with a search that might be going on here? Thanks ahead, Lon
In Windows 8.1 under Task Manager > Details I see WRSA.exe is running under the Windows Vista "Operating System Context." I'm curious if Webroot staff have any comment on that. I'm not claiming this is an issue since it doesn't seem to be that important based on my research - just curious about their thoughts.
The admin console is showing that my PC is infected, last infected december 4th When clicking on view next to the last infected and under the blocked programs, it doesnt show the december 4th infection, the last infection it shows is from december 2nd. however when I click on december 4th under endpoints infected in teh last 7 days, i see my PC, and when i click on it i see the last infection. Why does it now show in the first view? thanks
The Register has an article this morning about a new form of malware that maintains infection on machines and steals data without installing files. The malware is persistant through even after reboot. The malware resides in the computer registry only, yet isn't visible using RegEdit. Anyway, is webroot aware of this new malware and can webroot protect against it? The Register's article is here: [url=http://www.theregister.co.uk/2014/08/04/registryinfecting_rebootresisting_malware_has_no_files/]http://www.theregister.co.uk/2014/08/04/registryinfecting_rebootresisting_malware_has_no_files/[/url] Gdata Security Blog on it: [url=https://blog.gdatasoftware.com/blog/article/poweliks-the-persistent-malware-without-a-file.html]https://blog.gdatasoftware.com/blog/article/poweliks-the-persistent-malware-without-a-file.html[/url]
[b]HP Launches Helion Cloud Platform for Government[/b] by Jeffrey Burt A brief summary: [i]The solution builds off HP's larger efforts in the cloud, including the $1 billion being invested in R&D.[/i] Hewlett-Packard is rolling out a private cloud offering for government agencies that is based on the Helion cloud platform the tech vendor announced three weeks ago. HP's Helion Managed Private Cloud for Public Sector is designed to give governments on all levels—federal, state and local—a managed and dedicated private cloud solution that enables them to create a shared service model across multiple departments, with the agencies essentially playing the role of IT brokers. The agencies can manage and monitor the use of resources via a Web-based portal. The technology enables the cloud platform to rapidly scale, direct services to their users and effectively control costs by letting agencies pay only for what they use. The Helion solution—a highly automated private
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.