Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,135 Topics
- 3,656 Replies
i have a security concern/question that i'd like to check with some sercurity experts on this forum. I have an AD enviornment here and i'm considering disabling UAC via GPO to help resolve some minor issues with users accessing network shares. I've read on more than one occasion on the internet recommending disabling UAC to solve one problem or another and not necessarily my particular problem. I'm worried about the security hole that I might open and that i may regret later. So, trying to find that balance here in this enviorment. any tips/advice on this matter is appreciated. i can provide further details on the issue i'm trying to clear up if interested.
Dear Expert, I am a business customer for Webroot Security anywhere. Looking for an additional solution to apply company security disclaimer notice for the end user once they login to the computer. I would like to see the feedback from your end, what can be done to implement. Thanks
Samsung and Mozilla are teaming up on the future of Web browsing. The Firefox maker is collaborating with Samsung on a new Web browser engine known as Servo, which Mozilla said "is an attempt to rebuild the Web browser from the ground up on modern hardware, rethinking old assumptions along the way." >> Learn More. [url=http://www.pcmag.com/article2/0,2817,2417372,00.asp]http://www.pcmag.com/article2/0,2817,2417372,00.asp[/url]
Hi folks, I've been attempting to integrate Webroot SecureAnywhere with our Labtech RMM, however as Webroot is like [b]no other antivirus whatsoever [/b]I cannot do this successfully. It's a fantastic piece of kit and we'd love to have it picked up by our Labtech setup as we're currently rolling Webroot out throughout our client base. The issues we currently face are: 1. Labtech looks for a definition file, which I'm fairly sure Webroot does not store locally, so we cannot supply one. 2. Labtech looks for a command line scan function, which we cannot locate. 3. Labtech looks for an update command, which again Webroot does not require as we keep it updated with GPO Has anyone managed to successfully integrate Webroot with Labtech? We're currently on Labtech 2012.1 (CC and Agent v51.155) Thank you in advance for your assistance. Marc Hilton Network Engineer Spector
Here's something really cool I've been working on and it's now nearly complete. This is going to be great for businesses with hypervisor labs: here's the link to the discussion and progress on Vmware's forum: [url=http://communities.vmware.com/thread/427502?start=0&tstart=0]http://communities.vmware.com/thread/427502?start=0&tstart=0[/url] Please check it out and feel free to additonally discuss it here as well! I hope this thread assists many people!
Hi, I wish to mention here my problem with Webroot Threat Research: I have a customer who has [b]5700+ undetermined software[/b] in the '[i]All undetermined software seen[/i]' report [b]for months[/b]. (And some more customers with 1000+ undetermined software) First of all, I do not understand how this can happen? Actually, I expect Webroot Threat Research to classify all undetermined software as soon as possible, otherwise how could Webroot guarantee that there are not any malware among them --- that are being able to run on the endpoint thanks to the way WSA client is developed, it will run just until the client receives the BAD classification from the cloud. But it looks like many thousand software are simply never gets classified. So in my reading, a malware can simply run anytime for quite a long time (eg. for month as in our case). I think the expected approach from Webroot is that in case of undetermined objects added to the list and the reported to the cloud then Webroo
[h3]AGENT CHANGES IN BUILD 22.214.171.124 - March 27th 2013 [/h3][img]http://sw.nohold.net/Webroot/Images/wsab_endpoint_logo.png[/img] Improved[list] [*]Agent shutdown speed [*]Behavior logging in WIndows Event Logs [*]Identity Shield functionality on Windows Server 2008 [*]Kernel keylogger protection [*]Migration process for Prevx users to SecureAnywhere [/list] Added[list] [*]A registry value of type DWORD named NoStatistics under HKCUSoftwareWRData which, when set to 1, disables the behavior statistics on the status screen [/list] Fixed[list] [*]An issue with changed settings and local database data on shutdown [*]Compatiblity with Jeeves GARP software [*]Identifying cloud managed configuration settings [/list] Other [list] [*]Minor UI changes[/list] All Contents Copyright © 2013
Hi, I see that among the setting of business mobile protection there is a Device Attribute called "Ownership" and you can set this to "Employee owned" or "Company owned". Firstly, I just cannot find this setting explanation in the online help, so you may add explanation there. Secondly and most importantly, I got to this setting because my client is looking for a possiblitiy to enable the user of the device to set enything they like on Employee owned devices for the mobile protection, but wants to disable any setting changes on Company owned devices in the name of BYOD. (Something simliar to "Unmanaged" group in the business endpoint protection.) Can this setting do this for them? Or what is this setting really for? If this cannot do it today, this is a feature request and will you develop it and when? Best regards, Gyozo
I could do with a bit of assistance. I have downloaded the remote deployment tool to my local PC (we're a IT support company and I'm using my colleagues as guinea pigs). I have an .msi that I would like to deploy, and a list of the NETBIOS PC names that I want to deploy to. I have checked on a few of the computers that my account (by group membership) is an administrative account. The PC's I currently want to deploy to are Win 7. When reaching the Remote Depoyment screen, I am getting various errors from Not Installed to authentication errors. I could do with someone pointing me in the right direction.
Sorry, but I don't have time to pour over the new agreement. I'm afraid to click off on it and be possibly be bitten later. It would be nice if someone could post the differences between the new and previous agreements. Until then, I am unable to administer my endpoints and I need to badly. There seems to be some malware hijacking yahoo accounts on some of them.
Hey, Wondering if it's at all possible to automatically move a new computer to another group? Preferably via the command line or MSI. We're about to begin a rollout and would like to put each department into different groups, obviously this can be done via the management console, but we'd prefer to automate it a bit more. Any help appreciated. Thanks, Ryan
Hi! I'm fairly new to webroot so this might be a trivial question. In the few months I've been at my job we have received a few attack alerts emails from webroot. The emails always specify that 2 PCs are affected and when looking into it's really only 1 PC recently affected and the other was another instance that occured days or months ago (perhaps the last instance of an attack). Is there a reason why we are always are told 2 PCs are affected? Is this a setting that just needs to be adjusted? Thanks!
With the recent rebranding of Webroot Web Security Service (WWSS) to Webroot SecureAnywhere Web Security Service (WSAWSS), it got me thinking about tech acronyms in general. What's your favorite? Which ones do you think are the worst? How's BASIC for a good one? This old-school programming language stands for "Beginner's All-purpose Symbolic Instructions Code." Everybody can remember BASIC, but try remembering what it stands for. Good acronym! On the other side, I'll nominate SCSI (Small Computer System Interface) as being a less than pleasant sounding one. Skuzzy - that says it all. There are more where that came from. What are some of your favorites and least favorites?
Hi! We have a nbr of sites connected to the main company network via wireless broadband links that are often (very) slow/saturated or even down. There are between 2-40 staff at these sites. We are concerned that Webroot SecurityAnywhere Endpoint Protection scanning "back to the cloud" is slowing down the WAN at these remote sites even more. Can you please explain how Webroot works over a slow/down WAN link and also how we can configure it to reduce WAN bandwidth utilisation? Thanx Glenn
I log into the web portal every morning to take a look at things and see how everything is going. Make sure when new agent versions roll out that all my endpoints update to that version properly. This morning when I logged in I saw that one of my endpoints had updated to Agent Version 126.96.36.199. None of my other endpoints where updated to this new agent version. Now I understand that there are other factors that are involved and that they won't all update instantly, but I was trying to find release notes for this new Agent Version and I have alas come up unsuccessful. Anyone have any idea when these release notes will become available? Has anyone else had their endpoints updated to this new Agent Version?
Hello, we are using MozyPro online backups to backup our file server and SecureAnywhere Endpoint Protection on that same server. Unless we manually disable Realtime protection on the server, the backup always fails. I have added overrides for both the mozyprostat.exe and mozyprobackup.exe processes using their MD5 values. Regardless, I still need to disable realtime protection in order for the backup to run. Curiously, neither the Endpoint Protection agent nor the management console list any threats. Any suggestions?
The New York Times and Wall Street Journal have recently published articles on having their networks hacked by the Chinese government and malware planted on their machines. The malware was not detected by the security and anti-virus software these companies used. (If I recall, the NYT said that it's Symantec security software flagged 1 out of 46 pieces of malware.) Is webroot getting access to those malware samples and adding them to it's detection capabilities? [url=http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0]http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&_r=0[/url]
Could someone break down the exact technical reason that the numpad registry key shouldn't be deployed to every computer? I haven't seen an explanation of the exact cause of computers ignoring numpad input other than its the Identity Shield. Or what I lose by applying the key to a computer. Thanks!
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.