Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,134 Topics
- 3,648 Replies
Hi! We have a nbr of sites connected to the main company network via wireless broadband links that are often (very) slow/saturated or even down. There are between 2-40 staff at these sites. We are concerned that Webroot SecurityAnywhere Endpoint Protection scanning "back to the cloud" is slowing down the WAN at these remote sites even more. Can you please explain how Webroot works over a slow/down WAN link and also how we can configure it to reduce WAN bandwidth utilisation? Thanx Glenn
I log into the web portal every morning to take a look at things and see how everything is going. Make sure when new agent versions roll out that all my endpoints update to that version properly. This morning when I logged in I saw that one of my endpoints had updated to Agent Version 184.108.40.206. None of my other endpoints where updated to this new agent version. Now I understand that there are other factors that are involved and that they won't all update instantly, but I was trying to find release notes for this new Agent Version and I have alas come up unsuccessful. Anyone have any idea when these release notes will become available? Has anyone else had their endpoints updated to this new Agent Version?
Hi, I work with (implement) Webroot protceted systems for 8+ years, so I have always interested in the development of this company and its products. I was one of the beta testers of the new WSA product, too. Now, I tell you this because soon after the public release at the end of 2011 I noticed the the ID shiled stopped protecting my machine - and some tests proved it happened on every pc we tested. I have reported this some times already buit still I see it is not working at all. Having done some more tests, I fugred out that my very first thougth of the cause being my Hungarian OS was wrong - it does not protect on English OS either. Furthermore, support now keeps telling me that ID shiled shall protect browsers only - but as you will see below, the beta protected _any_ app I added to the protceted app list. Well, otherwise why is there a possiblity to maynually add any app? All the browsers are auto-added upon first run. Sidenote: the keylogger wer
I'm in the process of updating Java on all my workstations with the latest update from Oracle to address the newly discovered vulnerability. Since this is going to take me quite some time to complete, can you tell me if my workstations will be protected from potential exploits of Java--with or without Oracle's latest patch?
Hi everyone, I am reposting this message here in the right spot because I posted it in the wrong forum earlier. We have Webroot Enterprise edition. Here it is: I have to deploy Webroot SecureAnyWhere remotely using the remote deployment tool (RDT). I read through the whole manual but not able to work out how to set the paramenter to set the proxy server up in the advanced filed in RDT. By default you have SME, quiet. Dont know what SME stand for. Then I tried to use thise command line: CMDLINE="-proxyhost=ourproxy -proxyauth=0 -proxyuser= -proxypass= -proxyport=8080" /qn /L*v C:Windowsinstall_log.txt But the above does not work. The documentation is not really clear on this and there are no practical examples on how to do this. Tried to contact Webroot support but no reply. Has anyone tried this before and if so can someone explain it better to me. Also the web interface disappears from the client. I can see the Webroot service is installed and running but
The heuristics setting levels really give no way for me to make an informed decision on what level I should be setting them to other than your recommended defaults. Descriptions like "use this if you feel you're infected or think the endpoint is at high risk" leaves me kind of at the same place I started. I feel like I’m playing with fire changing them around, even on test machines. I'm not really sure where I'm going with this, but I thought I'd bring up...or something...
I've figured out a lot of the stuff in the scan logs but sometimes I'd feel better with a definitive explanation of some of the stuff. Has anyone compiled this information anywhere? Can I sign an NDA and be given the internal docs that the support people get? ;) Like, what's an SLevel?
I need to exclude some programs from real-time protection scanning and I need some direction. The error message is contained below. Right now the only work around to turn off protection scanning which is not acceptable. Any help would be greatly appreciated. OS: Windows Server 2008 R2 Standard (64-bit) RAM: 12GB CPU: Xeon 3.3GHz 4-Core Here is the error detail: Problem Event Name: BEX Application Name: NovaBackX.exe Application Version: 220.127.116.11 Application Timestamp: 50c3acfa Fault Module Name: WRusr.dll Fault Module Version: 18.104.22.168 Fault Module Timestamp: 50d237dd Exception Offset: 00018560 Exception Code: c0000005 Exception Data&colon; 00000008 OS Version: 6.1.7601.2.1.0.272.7 Locale ID: 1033 Additional Information 1: 2608 Additional Information 2: 2608c5700f693da309fa1a40136afc7c Additional Information 3: 0a97 Additional Information 4: 0a97994f40f74f03e0d128f2b3952d56
Today's edition of CNET's bi-weekly "Ask Maggie" tech advice column puts a small twist on a topic we here at Webroot are very well-versed on-[b]mobile[/b] [b]malware[/b] [b]and[/b] [b]how to[/b] [b]protect against it.[/b] The twist is the question: Will switching from iOS to Android increase the chance of getting malware on my mobile device? (You can read the full CNET article [url=http://news.cnet.com/8301-1035_3-57557684-94/should-malware-risks-factor-into-the-iphone-vs-android-debate/]here)[/url] While the article is about personal use, I think it's just as relevant for business conversation as BYOD continues to be a hot topic. So I'd like to extend the discussion to the Webroot Business Community to get your thoughts on this. 1. In general, how big of a concern is malware on mobile devices? How can it limit acceptance of BYOD policies? 2. If you're already using/planning to use BYOD at your company, which OS do you prefer your employees using? If it's iOS, is it becau
Webroot's own [b]Darren Niller[/b] posted this article over on [url=http://community.spiceworks.com/product/4895-webroot]our Spiceworks page:[/url] Take a look and post your thoughts! [h1][url=http://community.spiceworks.com/topic/262158-is-your-aging-endpoint-security-giving-you-gray-hairs]Is your aging endpoint security giving you gray hairs?[/url][/h1] The signature-based approach to protecting endpoints from cyberthreats has served organizations well for many years—some say perhaps too many. The increasing rate of breaches and infections represents just one symptom of a solution whose time has passed. If you are an IT professional in charge of managing endpoints, you likely understand the pain. [b]No signatures available for “zero-day threats”[/b] Developed almost two decades ago, legacy anti-virus/anti-malware technology uses large client applications to search for known “bad” patterns of data within executable files. It does this by comparing a signatu
I unfortunately tested the "deactivate" button on my own machine in the console. How do I clean this up and have it back in the proper group? I know the clue was in the "this cannot be undone" warning but hey, I'm inquisitive! Any help would be most welcome! Thanks, Arkaig
I read in the commercial info that endpoint security can be installed on top already installed safeguards. The FAQ in this thread talks about malware protection only though. Anyway since I am evaluating endpoint security, I left F-secure/2012 installed, which is also nice in case I am off-line, I think. Having both installed, I had trouble with Firefox. I could not logon to one of my bank accounts, using FF, win 7/32. What happened was that the click on the logon button was registered (dimmed) but no logon. Using Chrome I could logon. Apart from that I also got a false positive detection error from F-secure regarding WSA So I decided to continue the trials without an already installed package (but kept windows firewall of course) === edit, removed the screendumps from my cloud
Hi, I am currently conducting a trial of Webroot installed at a remote office in Malaysia, from Australia. Yesterday I received an email that one of the PC's there had been "Attacked", and checking the console this morning I see the message : [b]Alert 1 Endpoint needs attention We recommend you check whether this endpoint has automatic remediation enabled on the assigned policy.[/b] The endpoint shows as "Infected" by Malware called "W32.Rogue.32". The PC was last seen yesterday afternoon, a few minutes after the Malware was detected. There is no clean scan recorded. My question is : How do I know what action was taken by Webroot, or do I have to assume the file was quarantined ? There does not seem to be any way to see a log of the actions performed either successfully or not. I find the message "Infected" rather alarming as it implies there is still an infection ..... Thanks
I am trying the Endpoint product, and already had bought the Complete product. The endpoint version seems very similar, and same UI etc. So can I expect roughly the same functioning and issues compared with Complete? For example I could not paste a password into a VPN connection (nothing happened, while in notepad it was pasted). And I could not copy a value manually inserted in a login dialog (the clipboard remained unaltered). I know about identity protection>protected applications, and have set all entries there to allow. These are examples, the main question is how similar are the 2 products? (except getting the data/info/protection out of the cloud, I understand that difference)
After installing the Endpoint Protection, my browsers (firefox and chrome) seem to be using 15-20 % of the each (each) while I'm not doing anything... As soon as I uninstall the webroot endpoint, those numbers frop to 0-1 % for both firefox and chrome. Are we doing something wrong, or is this just a byproduct of the webroot endpoint? -Brian
Ugh..well I was trying to get my company off of AVG/Norton/Panda . I personally run Webroot on 5 personal machines. Unfortunately the inability to exclude folders ie e:SupportSecurityTools on our customer servers/Terminalservers from scans is a show stopper. In the real world..users forget passwords to outlook,zip files.. Download crap which does strange things.... We also store software/misc tools for decoding passwords... scanning networks/packet sniffers; Nirsoft tools.... most of which can be considered hacker tools in the wrong hands. My Techs now hate Webroot because it munches their tools on remote servers. They have to disable Webroot completely (VERY BAD) download the deleted tools... run 'em and then re-enable Webroot.. This costs time/money and frustration. Only they (techs) have administrator access and Administrator read/execute is required for those special "Tools" directories. If Hacker/virus gets admin access... server is pretty much screwed anyway so the &quo
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.