Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,128 Topics
- 3,621 Replies
Business Release Notes - Version 18.104.22.168
[h3]AGENT CHANGES IN BUILD 22.214.171.124 - March 27th 2013 [/h3][img]http://sw.nohold.net/Webroot/Images/wsab_endpoint_logo.png[/img] Improved[list] [*]Agent shutdown speed [*]Behavior logging in WIndows Event Logs [*]Identity Shield functionality on Windows Server 2008 [*]Kernel keylogger protection [*]Migration process for Prevx users to SecureAnywhere [/list] Added[list] [*]A registry value of type DWORD named NoStatistics under HKCUSoftwareWRData which, when set to 1, disables the behavior statistics on the status screen [/list] Fixed[list] [*]An issue with changed settings and local database data on shutdown [*]Compatiblity with Jeeves GARP software [*]Identifying cloud managed configuration settings [/list] Other [list] [*]Minor UI changes[/list] All Contents Copyright © 2013
BYOD with Webroot SecureAnywhere Mobile Protection
Hi, I see that among the setting of business mobile protection there is a Device Attribute called "Ownership" and you can set this to "Employee owned" or "Company owned". Firstly, I just cannot find this setting explanation in the online help, so you may add explanation there. Secondly and most importantly, I got to this setting because my client is looking for a possiblitiy to enable the user of the device to set enything they like on Employee owned devices for the mobile protection, but wants to disable any setting changes on Company owned devices in the name of BYOD. (Something simliar to "Unmanaged" group in the business endpoint protection.) Can this setting do this for them? Or what is this setting really for? If this cannot do it today, this is a feature request and will you develop it and when? Best regards, Gyozo
Help with SecureAnywhere remote deployment
I could do with a bit of assistance. I have downloaded the remote deployment tool to my local PC (we're a IT support company and I'm using my colleagues as guinea pigs). I have an .msi that I would like to deploy, and a list of the NETBIOS PC names that I want to deploy to. I have checked on a few of the computers that my account (by group membership) is an administrative account. The PC's I currently want to deploy to are Win 7. When reaching the Remote Depoyment screen, I am getting various errors from Not Installed to authentication errors. I could do with someone pointing me in the right direction.
New Business Solution Agreement
Sorry, but I don't have time to pour over the new agreement. I'm afraid to click off on it and be possibly be bitten later. It would be nice if someone could post the differences between the new and previous agreements. Until then, I am unable to administer my endpoints and I need to badly. There seems to be some malware hijacking yahoo accounts on some of them.
Remote deployment - automatic add to group?
Hey, Wondering if it's at all possible to automatically move a new computer to another group? Preferably via the command line or MSI. We're about to begin a rollout and would like to put each department into different groups, obviously this can be done via the management console, but we'd prefer to automate it a bit more. Any help appreciated. Thanks, Ryan
Email Attack Alerts
Hi! I'm fairly new to webroot so this might be a trivial question. In the few months I've been at my job we have received a few attack alerts emails from webroot. The emails always specify that 2 PCs are affected and when looking into it's really only 1 PC recently affected and the other was another instance that occured days or months ago (perhaps the last instance of an attack). Is there a reason why we are always are told 2 PCs are affected? Is this a setting that just needs to be adjusted? Thanks!
What's Your Favorite Tech Acronym?
With the recent rebranding of Webroot Web Security Service (WWSS) to Webroot SecureAnywhere Web Security Service (WSAWSS), it got me thinking about tech acronyms in general. What's your favorite? Which ones do you think are the worst? How's BASIC for a good one? This old-school programming language stands for "Beginner's All-purpose Symbolic Instructions Code." Everybody can remember BASIC, but try remembering what it stands for. Good acronym! On the other side, I'll nominate SCSI (Small Computer System Interface) as being a less than pleasant sounding one. Skuzzy - that says it all. There are more where that came from. What are some of your favorites and least favorites?
Webroot Scans Over a Slow Link
Hi! We have a nbr of sites connected to the main company network via wireless broadband links that are often (very) slow/saturated or even down. There are between 2-40 staff at these sites. We are concerned that Webroot SecurityAnywhere Endpoint Protection scanning "back to the cloud" is slowing down the WAN at these remote sites even more. Can you please explain how Webroot works over a slow/down WAN link and also how we can configure it to reduce WAN bandwidth utilisation? Thanx Glenn
WRSA Agent Version 126.96.36.199
I log into the web portal every morning to take a look at things and see how everything is going. Make sure when new agent versions roll out that all my endpoints update to that version properly. This morning when I logged in I saw that one of my endpoints had updated to Agent Version 188.8.131.52. None of my other endpoints where updated to this new agent version. Now I understand that there are other factors that are involved and that they won't all update instantly, but I was trying to find release notes for this new Agent Version and I have alas come up unsuccessful. Anyone have any idea when these release notes will become available? Has anyone else had their endpoints updated to this new Agent Version?
SecureAnywhere Endpoint Protection blocking MozyPro Online backups on file server
Hello, we are using MozyPro online backups to backup our file server and SecureAnywhere Endpoint Protection on that same server. Unless we manually disable Realtime protection on the server, the backup always fails. I have added overrides for both the mozyprostat.exe and mozyprobackup.exe processes using their MD5 values. Regardless, I still need to disable realtime protection in order for the backup to run. Curiously, neither the Endpoint Protection agent nor the management console list any threats. Any suggestions?
Webroot Malware Detection - Hackers in China Attacked The Times for Last 4 Months
The New York Times and Wall Street Journal have recently published articles on having their networks hacked by the Chinese government and malware planted on their machines. The malware was not detected by the security and anti-virus software these companies used. (If I recall, the NYT said that it's Symantec security software flagged 1 out of 46 pieces of malware.) Is webroot getting access to those malware samples and adding them to it's detection capabilities? [url=http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0]http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0[/url]
Why not deploy the numpad fix to everyone?
Could someone break down the exact technical reason that the numpad registry key shouldn't be deployed to every computer? I haven't seen an explanation of the exact cause of computers ignoring numpad input other than its the Identity Shield. Or what I lose by applying the key to a computer. Thanks!
ID Shield Issue on Hungarian OS
Hi, I work with (implement) Webroot protceted systems for 8+ years, so I have always interested in the development of this company and its products. I was one of the beta testers of the new WSA product, too. Now, I tell you this because soon after the public release at the end of 2011 I noticed the the ID shiled stopped protecting my machine - and some tests proved it happened on every pc we tested. I have reported this some times already buit still I see it is not working at all. Having done some more tests, I fugred out that my very first thougth of the cause being my Hungarian OS was wrong - it does not protect on English OS either. Furthermore, support now keeps telling me that ID shiled shall protect browsers only - but as you will see below, the beta protected _any_ app I added to the protceted app list. Well, otherwise why is there a possiblity to maynually add any app? All the browsers are auto-added upon first run. Sidenote: the keylogger wer
Are you (or your company) on Twitter?
As some of you might know, we at Webroot utilize Twitter to open up other channels of communication, sharing of news, and other Webroot related news. I figured it would be great for us all to follow each other, and ultimatley expanding your connections within the company. So with that, I invite everyone to follow our main channels, as well as my personal one. And if you are interested, be sure to post your Twitter handle here and we will be sure to follow you as well. Webroot - [url=http://twitter.com/webroot]@Webroot[/url] Webroot Support - [url=http://twitter.com/WebrootSupport]@WebrootSupport[/url] Richard - [url=http://twitter.com/rcmelick]@rcmelick[/url] See you all soon!
New java vulnerability
I'm in the process of updating Java on all my workstations with the latest update from Oracle to address the newly discovered vulnerability. Since this is going to take me quite some time to complete, can you tell me if my workstations will be protected from potential exploits of Java--with or without Oracle's latest patch?
Is there a guide to reading WSA scan logs?
I've figured out a lot of the stuff in the scan logs but sometimes I'd feel better with a definitive explanation of some of the stuff. Has anyone compiled this information anywhere? Can I sign an NDA and be given the internal docs that the support people get? ;) Like, what's an SLevel?
Heuristics: Too much of a black box to tell us what they do?
The heuristics setting levels really give no way for me to make an informed decision on what level I should be setting them to other than your recommended defaults. Descriptions like "use this if you feel you're infected or think the endpoint is at high risk" leaves me kind of at the same place I started. I feel like I’m playing with fire changing them around, even on test machines. I'm not really sure where I'm going with this, but I thought I'd bring up...or something...
Join the Conversation
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.