Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,648 Replies
I've used Webroot for a couple of years now; it's been great -- never bothering me unless I run across a threat on the Internet. UNTIL NOW... Over the weekend of 4/12, something changed: I use a program called Clarion 6.3 (Build 9059) by Softvelocity. I mostly use it to compile programs running under SQL 2008 (Developer version 10.0.5500.0). Since that weekend, whenever one of my programs calls SQL, I get the "This file is trying to connect to the Internet and is not trusted" message and I have to explicitly allow it. (It references the .exe name of the program compiled by Clarion, but doesn't display the error until it tries to access SQL.) I know it wasn't caused by a WinXP update, since I have automatic updates turned off (so I can approve updates before they're applied). I've tried allowing thru "Control Active Processes"; this works until the target .exe is recompiled (which might be every 5 minutes when I'm working on a program cha
Pretty scary stuff: [url=http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/]http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/[/url] found on [url=http://www.reddit.com/r/sysadmin/comments/23nx4o/microsoft_onedrive_for_business_modifies_files_as/]reddit[/url].
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) is a shim you can apply to executables on your system to help stop them from being used to attack the system if vulnerabilities are discovered. For example, if you have EMET applied to Java it has notably been able to prevent several zero-day attacks from working. This is what it's intended for. If you don't use it, I highly encourage you to check it out. We've used it for years. "The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform. The new EMET 4.0 al
[url=http://www.zdnet.com/first-windows-xp-now-exchange-2003-what-happens-when-the-clock-stops-on-support-7000015547/]http://www.zdnet.com/first-windows-xp-now-exchange-2003-what-happens-when-the-clock-stops-on-support-7000015547/[/url] Anyone still on Exchange 2003? You planning to migrate or keep using it?
Any update on this would the AV can penetrate and destroy on or while this is running on a machine. [url=http://www.computerworld.com.au/article/542449/cybercriminals_use_sophisticated_powershell-based_malware/?utm_medium=newsletter&eid=-6787&utm_source=computerworld-today-pm-edition]http://www.computerworld.com.au/article/542449/cybercriminals_use_sophisticated_powershell-based_malware/?utm_medium=newsletter&eid=-6787&utm_source=computerworld-today-pm-edition[/url]
Hello Dear All Am really have got a big problem with win32.sality&win32.virut.I have over 6 notebooks infected wirh ,and i couldnot restore these notebooks to factory setting due to many factors, so i need a solution for this problem without restoring these notebooks to factory default, and the other point in future how can i protect my notebooks from these infections Thank You
Hi Guys Currently it is not possible to get the trial key for WSA Endpoint Protection in the Firefox browser. We are redirected to a different subpage and do not get any trial key. Customers are very unhappy with this (over50% are using Firefox) - what can I say to them / when it will be fixed? Regards
The dmg opens fine and when I go the next step in the installer I get this error "An error occured while trying to download the neccessary files for this installation. Please double check your Internet connection and try again." This occurs on 2 Macs running 10.8 and 1 running 10.9. I've tried running the installer while on a tethered 3G connection and on the main network. Is there anything else I can try?
Webtoot has identified a threat while I am backing up files. I am wondering if it is safe to "continue" with removal of the threat while doing the backup? I don't want to interrupt the backup process, but didn't know if I could wait to do the threat removal or not? Thanks, Sam
[url=http://www.zdnet.com/following-months-of-speculation-box-files-for-ipo-7000025892/]http://www.zdnet.com/following-months-of-speculation-box-files-for-ipo-7000025892/[/url] Will be interesting to see how they do. Anyone use Box for online file storage, or do you use Dropbox or something else?
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/9236iEBF4801657755A23.jpg[/img] In December, Microsoft updated its Lync app for Windows 8 [url=http://www.neowin.net/news/microsoft-releases-lync-app-for-windows-81]so it would work with Windows 8.1[/url]. Today, the company released a new update for the app that contains quite a few new features for the business-themed messaging and chat program. The [url=http://blogs.technet.com/b/lync/archive/2014/03/20/march-update-to-lync-windows-store-app-now-available.aspx]official Lync blog[/url] states that the app update now includes a way to manage Lync meeting participants either individually or as a group. The blog says: [quote][i]You can mute a participant, send a private IM, view their contact card, promote to presenter or demote to an attendee. You can also invite more participants, mute all audience, and admit people to the meeting who are waiting in the lobby.[/i] [i] [/i] [ur
I hadn't run a speedtest here at Webroot yet, but when I did I was impressed :) [url=http://www.speedtest.net/my-result/3355512045]http://www.speedtest.net/my-result/3355512045[/url] How about you guys? What sort of speeds to you get at your work?
They have some nice online courses to help you out: [url=http://www.microsoftvirtualacademy.com/training-courses/getting-started-with-powershell-3-0-jump-start]http://www.microsoftvirtualacademy.com/training-courses/getting-started-with-powershell-3-0-jump-start[/url]
This one is huge ..... One of our customer has a big issue with new client version. Last update turn off the internet at all endpoints. There was no problem until the update. WSA cut off internet access on all machines where they raised to version .46. They edited policy settings and nothing - only help was to uninstall WSA or its complete shutdown. He can not send us logs from machines because as soon as they turn on the WSA - internet connection will be blocked. Do you or support can somehow remotely help with this situation?
I am impressed by Webroot Secure Anywhere but am a little concerned about the agent commands area in the console. In particular the "download and run a file" option. I appreciate that the the console is protected by a password and security code but this is not really full two factor authentication - in that a key logger could theoretically pickup entires as they are made and guess / brute force the security code. In the absence of a full two factor authentication ( a la e.g. Google 2FA) it is at least theoretically possible for my credentials to be compromised . In that event a malicious impostor who succeeded in getting into my console would de facto have access to all the computers on that keycode via the agent commands facility ? Should the more powerful agent commands not be removed from the console in the interest of greater security? Rocky
Backblaze is showing off the new version of their storage pod: [url=http://blog.backblaze.com/2014/03/19/backblaze-storage-pod-4/]http://blog.backblaze.com/2014/03/19/backblaze-storage-pod-4/[/url] It's nice to see the technology behind the scenes - they do a great job of sharing info on drive reliability and storage costs.
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.