Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,656 Replies
[h3]AGENT CHANGES IN BUILD 126.96.36.199 - March 27th 2013 [/h3][img]http://sw.nohold.net/Webroot/Images/wsab_endpoint_logo.png[/img] Improved[list] [*]Agent shutdown speed [*]Behavior logging in WIndows Event Logs [*]Identity Shield functionality on Windows Server 2008 [*]Kernel keylogger protection [*]Migration process for Prevx users to SecureAnywhere [/list] Added[list] [*]A registry value of type DWORD named NoStatistics under HKCUSoftwareWRData which, when set to 1, disables the behavior statistics on the status screen [/list] Fixed[list] [*]An issue with changed settings and local database data on shutdown [*]Compatiblity with Jeeves GARP software [*]Identifying cloud managed configuration settings [/list] Other [list] [*]Minor UI changes[/list] All Contents Copyright © 2013
I would like to be able to see the results of System Optimizer on all the PCs. It would be nice if there was a report for that but I don't see one. How do I view how much data System Optimizer cleaned to show my clients how much storage space Webroot is helping them free?
hi guys, i have a terminalserver 2008 r2 with secure anywhere. today a thread was found in one user session. on all other sessions a window popped up stating to remove or to wait to remove the thread. how can i configure that not all logged on users get this message? the system stopped respondig and a restart of the server was neccessary... what need to be configured differently ? thanx in advance... juergen
I am impressed by Webroot Secure Anywhere but am a little concerned about the agent commands area in the console. In particular the "download and run a file" option. I appreciate that the the console is protected by a password and security code but this is not really full two factor authentication - in that a key logger could theoretically pickup entires as they are made and guess / brute force the security code. In the absence of a full two factor authentication ( a la e.g. Google 2FA) it is at least theoretically possible for my credentials to be compromised . In that event a malicious impostor who succeeded in getting into my console would de facto have access to all the computers on that keycode via the agent commands facility ? Should the more powerful agent commands not be removed from the console in the interest of greater security? Rocky
Hi there, I'm facing with the a problem on the "Webroot Secure Anywhere" webconsole. After I delete a policy and try to create a new one with the same name, I get an error that the name is already in use and the console refuses me to create the policy used in the past. I think after I delete a policy I should have the ability to decide using the policy (name) again or not. A deleted policy does not mean that this will never be used again. Is there a workaround or a fix. Kindly assist me for this problem. Regards, Huseyin Keskin Belstar Denizcilik ve Tas. A.S. Country IT Manager
Hi, I'm new to Webroot; 3 days in to a 30-day, 40-seat trial of Endpoint Protection, and pretty happy/impressed so far. However, my boss has asked a few questions I have not been able to find the answers to. If a guest or visitor wants to use our wireless LAN to connect to the web, does Webroot automatically install the minute our server accepts the connection? I'm using the MSI installer with a Group Policy for fixed machines, which is working well, and if a Windows laptop with a wireless connection starts from cold, I'm reasonably sure it would be installed ok. What worries me is if a visitor brings an infected laptop from outside in hibernation mode, then wakes it, will we be vulnerable? When will the server become aware of the need to install from the GPO? And how does the GPO enforce installation if it's an Apple laptop? I know there's an installation file, but can that be forced onto Apple clients from a Windows server in a similar way? Even if the answer is
A few weeks ago Webroot was installed on a computer. The user logs on to a financial website that registers her computer. She has been required to request a code from the website to register her computer each time she goes to the site. This began about the same time as the Webroot installlation. Has anyone had this problem before? Could Webroot be interferring? What might be the solution? Thanks in advance.
I have PC's that are located in remote locations and not connected to internet. Is there a way to get definition files to these PC's via flash drive or DVD? My concern is getting virus from tech support folks working on the system and bringing flash drives to retrieve data or load software.
I see previous posts where Webroot Support suggests that retaining deactivated agent data is a good thing. I completely disagree. We aren't able to use the Dashboards at our business at all because the data is not valid because of this "feature". For example, we want to know when there are agents out there still using the Silent Audit mode or Managed by Policy or (insert just about every gadget here), but the dashboard reports that half of our clients are out of compliance. When we go to track them down, they are all Deactivated, so we don't care and the energy and effort to confirm this is counter-productive. Webroot, you're forcing us to go down a long road to nowhere when alerts are generated for deactivated agents. We should have the ability to determine when we can purge an agent completely versus being forced to have stale data in our system forever. I think we should be given that control, otherwise the product's dashboards are just a "
I recently pushed out Webroot using a group policy. I noticed that some computers are showing up twice in the console as protected machines. The duplicates are virtual XenCenter machines with static IP addresses. Does moving or rebooting these computers cause group policy to push out Webroot each time? How do I eliminate the duplicate computers from the console and prevent group policy from sending out the msi to machines that are already protected?
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/8075iE7A097B7487C53ED.jpg[/img] Our own [user=122][/user] is quoted [url=http://www.computerweekly.com/news/2240213571/Hackers-access-Yahoo-Mail-with-stolen-passwords]here[/url] about being responsible for your security: “In addition to multiple passwords, end users should also change their passwords on a regular basis and make sure to take advantage of any additional layers of security available such as biometrics, PIN and so on to ensure their data is safe in spite of any attempted hacks.” Since many people use the same password everywhere, your users could have a home Yahoo account with the same password as their work accounts. Good time to remind everyone to change their passwords or update your security policy to require regular changes.
We are preparing a new base image to be used with XenDesktop 7.5 personal vDisks. Should the webroot client be installed on the base image, or within the user's personal vdisk via GPO? If installed on the base image, would the -clone or -uniqueid switch be used?
Pretty scary stuff: [url=http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/]http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/[/url] found on [url=http://www.reddit.com/r/sysadmin/comments/23nx4o/microsoft_onedrive_for_business_modifies_files_as/]reddit[/url].