Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,128 Topics
- 3,621 Replies
Webroot Secureanywhere Scan
Hello, this is a real basic question. Webroot detected 2 viruses on my computer. It specified at the end of the scan to change password for on-line banking. I went ahead and did that. But after doing that a few hours later Webroot found 1 more then another 3 this morning. My question is, since this happened a few times after changing my on line passwords, does that mean that it was pointless to change my passwords because after changing them i received other threats? Please advise. Thank you.
Why did you block our site?
This caused our customers who subscribe to your services or one of your partners (Cisco) to lose access to our site. We reviewed our servers and found nothing to indicate we had a problem. The canned response (see below) provieded is not enough to justify the interupption to our business. We want specific justification for your actions. "Our automated evaluation system uses a machine learning algorithm to determine the reputation of an IP, to which the experience of a Web and Threat Analysis team is added when further research on a website is requested. Unfortunately we cannot disclose the proprietary intelligence data collected regarding this site. If further details are needed you may elect to contact the IP owner in order to request more information about any recent changes to the site source code that may have triggered the scanners to flag the site as malicious. Best, Webroot BrightCloud Threat Intelligence Support" Doug Downing
how to change policy settings via cellphone
Hello guys,Is there anyone here who knows how to change policy settings via cellphone, sometimes I'm in a condition where I can't open my laptop, but I have to change the policy settings, whereas via cellphone I can only create a new policy without making changes to it, even I can't change the user endpoint policy. Thanks
Question about "Threats Seen" on web interface
**Sorry, originally posted this in the wrong section** Hi guys, Introductions first, I'm Marc, sys & support admin for Fónua Ltd in Ireland. I've been trying to advocate the switch to Webroot for some time now and a repeat encounter today with that darn CryptoLocker virus gave me the perfect window to do so. I signed up for a trial version and have set up the endpoint client on 10 IT PC's for testing purposes. Now I'd like to mention I've used Webroot before, my previous employment was with an IT services provider who deployed and managed Webroot services to clients. So far everything has been fine, with one glaring exception. To showcase Webroot in the IT department alone I tested it with a number of virus', and it worked beautifully. 18 detected threats on the one machine and nothing escaped the net. However, I then went to showcase the web interface for the administration control and one thing stood out like a sore thumb. The
Microsoft OneDrive for Business modifies files at it syncs
Pretty scary stuff: [url=http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/]http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/[/url] found on [url=http://www.reddit.com/r/sysadmin/comments/23nx4o/microsoft_onedrive_for_business_modifies_files_as/]reddit[/url].
Infection Alert Emails Not Sent via TLS
I just enabled a feature of our email service that tells me when incoming emails were not sent via TLS. It is telling me that Infection Alert messages from email@example.com are not utilizing TLS. This is probably minor, but it could constitute a security risk in some cases.
Effitas report response
I had always been told that webroot was a particularly good product against new viruses and ransomware because of the "learning" system in place. The q3 2016 effitas report doesn't really indicate this though, and there aren't very many other in depth reports like this around. Does webroot have a response to this or upcoming plans to better this field in particular. Any specifics? [url=https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf]https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf[/url]
Spiceworks project writeup of a Webroot deployment
One of our customers on Spiceworks wrote up how the switch to Webroot went for him. Check it out here: [url=http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install]http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install[/url]
Email alerts - how long should they take?
Was wondering what the expected delay time should be between the time a threat is detected and an email is sent out. From my testing it seems to be kind of random and so far I am seeing it take about 20 minutes on average. We are coming from Symantec Endpoint Cloud and we receive the emails seconds after the threat is detected. What is great about that is we can react and call the end user immediately to see what they opened or what website they were on if we feel is necessary. So how long should an email notification take before we receive after threat detected? From what I read here some threats do not generate a threat on console or alert emails. Why is this and can we change that?
Webroot Filtering Extension slowing down Mozilla Firefox on Google results pages
Hi, On a Google results page, when scrolling the page halts for (a few) seconds - disabling the Webroot Filtering Extension fixes that. Anybody else seeing this? Win 10 Pro - 64 Firefox 50.0.1 - 64 google.co.uk Cheers, Edwin
The Best Cloud Computing Companies And CEOs To Work For In 2015
[h1]The Best Cloud Computing Companies And CEOs To Work For In 2015[/h1][url=http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/]http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/[/url]
Windows PowerShell 4.0 Quick Reference Guides are Available for Download
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/10244iC14A2A76C9E07931.jpg[/img] Are you a frequent user of PowerShell, but always find yourself wishing you had a great quick reference sheet available? Then you will definitely love this bit of news! Microsoft has released an updated set of PowerShell quick reference guides so that you always have the information you need within easy reach! [url=http://www.microsoft.com/en-us/download/details.aspx?id=42554]Windows PowerShell 4.0 and Other Quick Reference Guides Home Page[/url] [Microsoft Download Center] [url=http://www.howtogeek.com/187970/windows-powershell-4.0-quick-reference-guides-are-available-for-download/]Full Article[/url]
New cybercrime book from Webroot's CTO Hal Lonas
Hal Lonas, Webroot CTO, has joined a select group of Cyber-security experts from around the world, to co-write the book titled, [i][url=https://www.amazon.com/Easy-Prey-Worlds-Leading-Experts/dp/0996688781/ref=as_li_ss_tl?ie=UTF8&qid=1472164889&sr=8-1&keywords=easy+prey&linkCode=sl1&tag=dicksnantonag-20&linkId=6c1aadb65e6b7fdf291b68e96e476a67]Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud[/url][/i]. The book was published by TechnologyPress and reached best-seller status in three Amazon.com categories[b]. [/b]Hal contributed a chapter titled “Beating Bad Guys At Their Own Game – Using Automation For Prevention." [url=https://www.prbuzz.com/books-publishing-literature/391414-hal-lonas-hits-amazon-best-seller-list-with-easy-prey.html]See the full story here![/url]
3D printer demo at the SpiceCorp meetup we hosted last night
We occasionally host [url=http://community.spiceworks.com/spicecorps]SpiceCorps meetings[/url] at our Webroot office in Broomfield. We had Jamie from [url=http://i-t-w.com/]IT Works[/url] come and bring some printers with him to demo. He gave a great demo and brought a bunch of really cool printed examples as well as firing up his Lulzbot printer and printing us out a mini-SpiceRex. He also let us know that many libraries now have free 3D printers to use for patrons, so it's a good way to get started if you want to tinker. I had no idea that [url=https://www.lulzbot.com/]Lulzbot[/url] was a Colorado company, about an hour north of Webroot. They apparently do factory tours every Friday, where you can see them use their own 3D printers to make the parts for the new ones. Here are some of the photos I took: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/22557i1C6E355401E6B9A7.jpg[/img] [img]https://d1q
Anyone had their website hacked?
The Guardian wrote an interesting article about what it is like as an SMB to get your website hacked. Has this every happened to you? [url=http://www.theguardian.com/technology/2014/aug/22/small-business-website-hacked-cyber-security]http://www.theguardian.com/technology/2014/aug/22/small-business-website-hacked-cyber-security[/url]
Join the Conversation
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.