Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,606 Replies
Hi there, We are running a Default Policy named as "XYZ Default" nationally. Since our branches are expanding. We would like to setup Email Alerts to different support staff who are managing IT at different branches based on Firewall IP. For example: The branch in Ottawa is been taken care by a support team "IT Department". So we need to send E-mail Alerts when a Threat is Detected to firstname.lastname@example.org,email@example.com .I was trying to set an alert if a Firewall IP matches from the Ottawa Location, the support staff in Ottawa only should be receiving e-mail alerts, but i don't see an option to create policy based on IP Address. It would be great if you can assist us in setting up Policies based on Firewall Ip and alerts being directed to the appropriate Locations. To summarize the above thing: 1. Creation of Policy based on Firewall Ip 2. Each Firewall Ip is destined to a different Location How to send a test alert to see if the email notification are successfully delivered
I'm looking for a way to get email notification whenever endpoint block an application or process and add them to deny list? I'm new to webroot and having difficulty finding out which process or application has been blocked. We have over 3000 endpoint deployments. Appreciate any help. Regards.
[b]Posted on 07 May 2015.[/b] High workplace stress levels for IT professionals are dramatically impacting both employees and employers. These impacts are illustrated by increases in those staff looking to find another job, and in those working increasing amounts of unpaid overtime to cope with workloads. A growing number of IT staff are also experiencing substantial disruption to their personal lives as a result of work demands. [img]http://www.net-security.org/images/articles/gfi-052015-2.jpg[/img] [url=http://www.net-security.org/secworld.php?id=18358]Full Article[/url]
Was wondering what the expected delay time should be between the time a threat is detected and an email is sent out. From my testing it seems to be kind of random and so far I am seeing it take about 20 minutes on average. We are coming from Symantec Endpoint Cloud and we receive the emails seconds after the threat is detected. What is great about that is we can react and call the end user immediately to see what they opened or what website they were on if we feel is necessary. So how long should an email notification take before we receive after threat detected? From what I read here some threats do not generate a threat on console or alert emails. Why is this and can we change that?
Has anyone deployed Webroot SecureAnywhere Business Endpoint Protection over Bit9? We have a potential customer who is currently using Bit9 and they want to deploy WSAB over it until they have a chance to finish uninstalling. If anyone has done this previously, please let us know how it went. Thanks!
Hi, On a Google results page, when scrolling the page halts for (a few) seconds - disabling the Webroot Filtering Extension fixes that. Anybody else seeing this? Win 10 Pro - 64 Firefox 50.0.1 - 64 google.co.uk Cheers, Edwin
Interesting discussion here on reddit: [url=https://www.reddit.com/r/meraki/comments/41laj8/did_the_z1s_just_get_a_bandwidth_lock_pushed_down/]https://www.reddit.com/r/meraki/comments/41laj8/did_the_z1s_just_get_a_bandwidth_lock_pushed_down/[/url] Apparently they were only ever rated for 50Mbps, but now they're enforcing that as an upper limit rather than allowing it to have higher throughput. Which sucks for anyone who already was using one in a situation that was working with a higher throughput.
Hal Lonas, Webroot CTO, has joined a select group of Cyber-security experts from around the world, to co-write the book titled, [i][url=https://www.amazon.com/Easy-Prey-Worlds-Leading-Experts/dp/0996688781/ref=as_li_ss_tl?ie=UTF8&qid=1472164889&sr=8-1&keywords=easy+prey&linkCode=sl1&tag=dicksnantonag-20&linkId=6c1aadb65e6b7fdf291b68e96e476a67]Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud[/url][/i]. The book was published by TechnologyPress and reached best-seller status in three Amazon.com categories[b]. [/b]Hal contributed a chapter titled “Beating Bad Guys At Their Own Game – Using Automation For Prevention." [url=https://www.prbuzz.com/books-publishing-literature/391414-hal-lonas-hits-amazon-best-seller-list-with-easy-prey.html]See the full story here![/url]
We are having an issue when we installed the client on a Windows 2008 Term server. We have client apps that they use and it is slowing down the apps. The apps are for Tirepower and when they go to print from it, it takes 2-3 times the amount of time it normally takes. Has anyone else had this issue?
[h1]The Best Cloud Computing Companies And CEOs To Work For In 2015[/h1][url=http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/]http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/[/url]
Check it out here: [url=https://twitter.com/LabTechSoftware/status/660095089264431104]https://twitter.com/LabTechSoftware/status/660095089264431104[/url] Who else is a Labtech users? Let us know what you think of the integration.
Veeam, the company behind one of the best backup solutions for virtual environments, today announced a new product: Veeam Endpoint Backup Free [quote][b]What is it? [/b]Veeam Endpoint Backup Free is a product that allows you to backup your windows based computers to an internal or external hard-drive, a NAS share or a Veeam Backup Repository. With this solution, you will be able to protect files, volumes or your entire computer based on your own schedule or at logon or logoff[/quote][quote]Veeam Endpoint Backup free will have great features such as pausing the backup when the system is busy (automatically, with the option Backup I/O control selected), automatic update notifications, auto-recognizing of the external hard drive that has your backups stored, finding and adding installed drivers to the recovery bootable media (and the possibility to add specific drivers yourself) and much more.When creating recovery bootable media, you will also automatically receive additional tool
I had always been told that webroot was a particularly good product against new viruses and ransomware because of the "learning" system in place. The q3 2016 effitas report doesn't really indicate this though, and there aren't very many other in depth reports like this around. Does webroot have a response to this or upcoming plans to better this field in particular. Any specifics? [url=https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf]https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf[/url]
I am using WebRoot SecureAnywhere version 126.96.36.199 on a Lenovo T520 running Windows 10. Every time that I select Optimize it runs like everything is fine until it gets to C:ProgramDataMicrosoftWindowsCookiesindex.dat and then the optimize screen will suddenly close. I never get the confirmation window and status, but just goes back to the WebRoot SecureAnywhere window. I found that the file noted didn't exist, so I created the Cookies Directory, and made an empty index.dat file. Still it dies there. I have tried to find logs to point to a problem but the scan logs are completely useless. I have also looked in Windows Event Viewer which is also not proving helpful. My question is two fold: Has anyone seen this or a similar issue before (and hopefully can provide a resolution), or can anyone point me to logs for the Optimize function? Thanks.
I want to contact support about what I believe to be faulty security notations on Search Engine Search results lists. In every browser I get stuck in a "Log In / Contact Support / Log in / Contact Support .... " loop. It is very frustrating! Is there a direct way to send an email or get support? Thanks, Merv
Helpful Guides for Preventing RansomwareKnowledge Base
We are continuously developing new material to help protect individuals against ransomware and other threats. Here are a few of our recent publications that you may share with your friends, family, and co-workers. Whitepaper - [url=http://community.webroot.com/html/assets/QA_cryptoransomware_us.pdf]Q&A The Truth About Crypto Ransomware[/url] Webinar - [url=https://www.brighttalk.com/webcast/8241/215721]Defeating Polymorphic Phishing[/url] Webinar - [url=https://www.brighttalk.com/webcast/8241/181083]Cloud Security Best Practices for Defending Against APTs[/url] Podcast - [url=https://www.webroot.com/blog/2016/09/21/protecting-against-emerging-ransomware/]Protecting Against Emerging Ransomware[/url]
Best practices guide recommends using Silent Audit profile on new client machines. It suggests "After using the Silent Audit policy for a day or two, you can create overrides to address unknowns and work with support to correct any false positives you may have encountered." In the "Addressing Unknowns" it appears to be re-active guidance to use the report to see if the program on a host is in the unknown list. And then how to create overrides from the report. Is it possible to use the report pro-actively to create overrides? If not are there other tools that could do this? Is dwell time significant? Given two program with same first seen and same last seen but different dwell times, does it suggest one is monitored more frequently? Does it indicate how long the file was in a monitoring state (i.e. a long dwell time suggesting program is alway active and a shorter dwell time suggesting how long the last monitoring event ran)? Thanks, Greg
We occasionally host [url=http://community.spiceworks.com/spicecorps]SpiceCorps meetings[/url] at our Webroot office in Broomfield. We had Jamie from [url=http://i-t-w.com/]IT Works[/url] come and bring some printers with him to demo. He gave a great demo and brought a bunch of really cool printed examples as well as firing up his Lulzbot printer and printing us out a mini-SpiceRex. He also let us know that many libraries now have free 3D printers to use for patrons, so it's a good way to get started if you want to tinker. I had no idea that [url=https://www.lulzbot.com/]Lulzbot[/url] was a Colorado company, about an hour north of Webroot. They apparently do factory tours every Friday, where you can see them use their own 3D printers to make the parts for the new ones. Here are some of the photos I took: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/22557i1C6E355401E6B9A7.jpg[/img] [img]https://d1q
Hi Webroot Community, One of my client, wants to be able to activate a temporary license for a loan laptot that's gonna be replace a week by now (when the original laptot will be repair) . What's the better way to do this ? Do I simply activate it using the same key code and after the repair I desactivate that laptop ? Can I have a demo license that's not gonna cost any charges and that I don't need to make changes in my console each time a computer goes to repair.
One of our customers on Spiceworks wrote up how the switch to Webroot went for him. Check it out here: [url=http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install]http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install[/url]
We are very excited to share our growth over the previous quarter and fiscal year! Check out the [url=https://www.webroot.com/us/en/company/press-room/releases/webroot-announces-record-fiscal-year-2016]press release here[/url], and thank you all for being a big part of our success! Cheers! :D
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.