Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,648 Replies
Ok, just deployed 2 new servers, Windows 2012 core, GUI currently in use as we deploy. Build the servers, patch the servers (all 900mb worth of WIndows updates), do all the standard stuff, activate, initialize disks etc etc. Install Webroot, disable Windows firewall, in one instance I DCPromo'd the box on the build bench as it was a new domain and network, in the second instance I dcpromo'd the box after it was plugged into an existing domain. In both cases I then shut the boxes off after running them for a couple days, boxed them up, and onsite installs were done shortly thereafter (maximum 5 days offline). On one server nothing is running but the server OS, AD, DNS, webroot, logmein, PRTG server monitor probe, and HP tools and ILO. On the second server, same thing but it was joined to an existing domain then dcpromo'd so the AD has users, machines, and some other domain stuff in AD. Nothing else is running Both times after having been back online for a day or so a secon
Ok, fiddling a bit with a few installs on the way to rollouts of Webroot Endpoint. What I would like to know is how do I prevent an end user from uninstalling webroot? I just got off an end users machine who uninstalled the other AV bloatware because it slowed his machine down too much. Not an uncommon sentiment, but then I installed webroot on one of my machines and I was able to uninstall it from add/remove programs without a password (the type the above letters verification code was tricky though :) ), and even if I remove the Webroot item from add/remove programs the end user can still go and delete the webroot executable from the program files(x86)webroot directory. Many of my end users are local admins on their machines, so I need an uninstall password on the app. Is this built in somewhere and I am missing it? Some other way to avoid users doing this? If the executable is deleted does the web console push it back out? Am I missing something? Thanks, Wayne&nb
As it stands now the "Reset" command doesn't really live up to its name. The documentation says, [i]"Reset: Return Webroot SecureAnywhere settings to their defaults."[/i] The console says, [i]"Reset SecureAnywhere to its original settings on this endpoint." [/i] However, when the application is 100% controlled by the web console, this description of resetting settings doesn't make sense. If I control the settings why would I reset them to defaults, they should already be at defaults. Unmentioned in this description is that it also resets the collected data about the identity shield and active process monitoring. But using your own console and agent GUI as a guide, those are not considered settings. What is being talked about is the [i]state[/i] of the application since they are not something directly set by me as a central administrator. They are dynamically populated and at this time not able to be properly managed. This terminology is ambiguous to an administrator.
Hello - I was just notified by my boss that his brother recieved a notice from Webroot when visiting our website: "Webroot has blocked access to a potentially threatening site." The site is [url=http://www.alturaassociates.com/]www.alturaassociates.com[/url]. I don't understand why we are designated a potentially threatening site - we offer no downloads or software. We just have a simple brochure website for our engineerings services consulting practice. Is there a way to have this designation reviewed and get our site whitelisted? Thank you.
As some of you may know, this year's [url=http://community.webroot.com/t5/Events-Conferences/Gartner-Security-amp-Risk-Management-Summit-2013/m-p/43930#.UbjwotjV2L0]Gartner Security & Risk Management Summit[/url] is going on right now in Washington D.C. Yesterday, a Gartner analyst revealed a top 10 list of IT Security 'misperceptions' or myths as well as what they believe is the cure for all 10. (Networkworld posted the full article [url=http://bit.ly/11A3g3o]here[/url].) They are as follows: 1. It won't happen to me. 2. Infosec budgets are 10% of IT spend. 3. Security risks can be quantified. 4. We have physical security (or SSL) so we know your data is safe. 5. Password expiration and complexity reduces risk. 6. Moving the CISO outside of IT will automatically ensure good security. 7. Adhering to security practices is the CISO's problem. 8. Buy this 'tool' and it will solve all of your problems. 9. Let's get
Before joining Webroot, I worked as a Network Administrator in the Marine Corps. I’ve seen tools come and go – some were great and some were more trouble than they were worth – but all were designed with the hope of making my life easier. Granted, many of those tools are long gone, but after I left the military, I continued to provide IT support to small businesses in my area. During that time, I found the majority of tools were lacking, often hindering more than helping, so I set forth in search of the latest and greatest. Although I don’t do as much IT work as I once did, I recently rebuilt my support toolbox for those occasions when I need to help someone out. What follows is a list of my go-to programs that have helped me solve issues, manage my time, or better communicate with my team. I want to share these tools with you because, while they might come from smaller companies, they have a big bite and help save a lot of time. [b] [/b] [b]Webroot[/b] [b]Website:[/b] [url=h
Hi. I am trying to audit a users internet history for the last 6 months. If I go in to Reports and use Daily Time Spent Surfing By User I get the informmation I need, but that only allows a time window of 1 month. If I go in to Logs and choose Full Audit, I can retrieve the internet hostory for 1 year, but this is only sites visited. I am looking for summary information of time spent surfing for the last 6 months, and given a full audit can list sites for the last 12 months the information must be there. Is it possible to get a report for a longer period than 1 month? The product is Webroot Secure Anywhere - Total Web Protection. Thanks, Ian
Hi all, In the Remote Deployment Tool I'm receiving a "Authenticating...failed, Unexpected error 1909" when scanning our network for endpoints. What does this mean and what triggers it? I have been able to use the RDT successfully before, deploying to about 30 computers. Last week, the first time I received this message, I refreshed the states and the endpoints showed up as normal and I could deploy changes. Now no matter how many times I refresh I get this error and the status of these endpoints changes each refresh state. They flip between the the 1909 error, and "Invalid Username/password" and "Network path not found." My coworker's RDT pulls up the endpoints just fine. I'm not sure what's going on. Any insight would be appreciated.
Hi I was trying to find a way to uninstall other AV software (ESET in this case) using WSA. I did the following: I created an override in the console for ESET marking it as bad. It seemed to work pretty fine because ESET disspeared. Would you recommend such actions or rather not? Do you have any other suggestions about how to achieve this? For example executing an agent command with some DOS command? It would be a huge asset for companies with many endpoints if they could uninstall their previous software with Webroot.
I am wanting to periodically scan my user home directories where they store all their personal files for viruses/malware. But when I do a custom scan it will scan only the directory that I choose and not any subdirectories therein. Any way around that? I want to do this about once a quarter to give me a comfort level. Is there any way to do this? John
If you have a minor question you don't want to create a topic about, post it here and we'll try to answer. These should be very small questions/things you might feel silly asking. Otherwise please create your own topic - you're free to create as many as you want. If you're a business customer and you need an answer right away remember that Webroot premium business support (ticket and phone) is included as part of your subscription. Shout-out to Ron and Greg who are legit.
I am testing msi deployment as we are about to roll this out to an enterprise client. I am using a "live" test environment of various server and client operating systems. When I first deployed this to a client machine, the webroot icon in the system tray had a warning triangle stating that a scan was required. Is there anyway to get Webroot to scan immediately anyway, as with 200 + machines to roll this out to, we could do without manual intervention. TIA
Hi Could anyone please explain a little bit more the following option in WSA: "Enable Predictive Offline Protection from the central SecureAnywhere database". From what I read about it it seems to be a sort of a local mini signature database. Is that right? So where is it located? How big it is? Is it updated constantly? How effective/comprehensive it is? Thanks!
Hi All Haviing a very strange issue with some of our users when performing a search on [url=http://www.google.com.]www.google.com.[/url] When searching, users are randomly getting the following error message. "Our systems have detected unusual traffic from your computer network. This page checks to see if it's really you sending the requests, and not a robot" We dont think this is an issue with our network as when we switch off webroot we no longer get the error message. Anyone have any idea? Go easy on me i am a noob. James.
I installed webroot. My main drating program needed an update. I tried to update and got Feature Transfer Error- Message Acess Denied. Unistalled webroot. Still wouldn't work. Uninstalled my program for fresh install. It still get the same access denied message for an intall. Got another install version. Same thing. Any ideas?
I'd like to change some settings for the system cleaner, but it rejects changes because they need to be applied via the admin console. I have yet to find any settings for this in the admin console, or any way of overriding GUI changes for system cleaner and active process control. Any thoughts?
i have a security concern/question that i'd like to check with some sercurity experts on this forum. I have an AD enviornment here and i'm considering disabling UAC via GPO to help resolve some minor issues with users accessing network shares. I've read on more than one occasion on the internet recommending disabling UAC to solve one problem or another and not necessarily my particular problem. I'm worried about the security hole that I might open and that i may regret later. So, trying to find that balance here in this enviorment. any tips/advice on this matter is appreciated. i can provide further details on the issue i'm trying to clear up if interested.
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.