Webroot® Business Endpoint Protection
Welcome to the Endpoint Protection and management console Discussion Forum!
- 1,128 Topics
- 3,583 Replies
This caused our customers who subscribe to your services or one of your partners (Cisco) to lose access to our site. We reviewed our servers and found nothing to indicate we had a problem. The canned response (see below) provieded is not enough to justify the interupption to our business. We want specific justification for your actions. "Our automated evaluation system uses a machine learning algorithm to determine the reputation of an IP, to which the experience of a Web and Threat Analysis team is added when further research on a website is requested. Unfortunately we cannot disclose the proprietary intelligence data collected regarding this site. If further details are needed you may elect to contact the IP owner in order to request more information about any recent changes to the site source code that may have triggered the scanners to flag the site as malicious. Best, Webroot BrightCloud Threat Intelligence Support" Doug Downing
My Master Life Coaching client, brought her hard drive to me, and asked to work on her website with my help. Then after jumping her hard drive into my desk top with an adapter, my desk top had 8 threats. Here are my questions. Is it likely the threats were from her hard drive, or from go-daddy website builder? Is there any threat that our websites may be contaminated; and if so how can I check, or treat the threats so no one gets boobie-trapped just by going to our sites? (mine is through vistaprint)
**Sorry, originally posted this in the wrong section** Hi guys, Introductions first, I'm Marc, sys & support admin for Fónua Ltd in Ireland. I've been trying to advocate the switch to Webroot for some time now and a repeat encounter today with that darn CryptoLocker virus gave me the perfect window to do so. I signed up for a trial version and have set up the endpoint client on 10 IT PC's for testing purposes. Now I'd like to mention I've used Webroot before, my previous employment was with an IT services provider who deployed and managed Webroot services to clients. So far everything has been fine, with one glaring exception. To showcase Webroot in the IT department alone I tested it with a number of virus', and it worked beautifully. 18 detected threats on the one machine and nothing escaped the net. However, I then went to showcase the web interface for the administration control and one thing stood out like a sore thumb. The
Pretty scary stuff: [url=http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/]http://www.myce.com/news/microsoft-onedrive-for-business-modifies-files-as-it-syncs-71168/[/url] found on [url=http://www.reddit.com/r/sysadmin/comments/23nx4o/microsoft_onedrive_for_business_modifies_files_as/]reddit[/url].
I had always been told that webroot was a particularly good product against new viruses and ransomware because of the "learning" system in place. The q3 2016 effitas report doesn't really indicate this though, and there aren't very many other in depth reports like this around. Does webroot have a response to this or upcoming plans to better this field in particular. Any specifics? [url=https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf]https://www.mrg-effitas.com/wp-content/uploads/2016/11/MRG-Effitas-360-Assessment-Q3-2016.pdf[/url]
One of our customers on Spiceworks wrote up how the switch to Webroot went for him. Check it out here: [url=http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install]http://community.spiceworks.com/people/jimmy-t/projects/webroot-secureanywhere-install[/url]
Was wondering what the expected delay time should be between the time a threat is detected and an email is sent out. From my testing it seems to be kind of random and so far I am seeing it take about 20 minutes on average. We are coming from Symantec Endpoint Cloud and we receive the emails seconds after the threat is detected. What is great about that is we can react and call the end user immediately to see what they opened or what website they were on if we feel is necessary. So how long should an email notification take before we receive after threat detected? From what I read here some threats do not generate a threat on console or alert emails. Why is this and can we change that?
[h1]The Best Cloud Computing Companies And CEOs To Work For In 2015[/h1][url=http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/]http://www.forbes.com/sites/louiscolumbus/2015/01/29/the-best-cloud-computing-companies-and-ceos-to-work-for-in-2015/[/url]
Hi, On a Google results page, when scrolling the page halts for (a few) seconds - disabling the Webroot Filtering Extension fixes that. Anybody else seeing this? Win 10 Pro - 64 Firefox 50.0.1 - 64 google.co.uk Cheers, Edwin
Hal Lonas, Webroot CTO, has joined a select group of Cyber-security experts from around the world, to co-write the book titled, [i][url=https://www.amazon.com/Easy-Prey-Worlds-Leading-Experts/dp/0996688781/ref=as_li_ss_tl?ie=UTF8&qid=1472164889&sr=8-1&keywords=easy+prey&linkCode=sl1&tag=dicksnantonag-20&linkId=6c1aadb65e6b7fdf291b68e96e476a67]Easy Prey: How to Protect Your Business from Data Breach, Cybercrime, & Employee Fraud[/url][/i]. The book was published by TechnologyPress and reached best-seller status in three Amazon.com categories[b]. [/b]Hal contributed a chapter titled “Beating Bad Guys At Their Own Game – Using Automation For Prevention." [url=https://www.prbuzz.com/books-publishing-literature/391414-hal-lonas-hits-amazon-best-seller-list-with-easy-prey.html]See the full story here![/url]
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/10244iC14A2A76C9E07931.jpg[/img] Are you a frequent user of PowerShell, but always find yourself wishing you had a great quick reference sheet available? Then you will definitely love this bit of news! Microsoft has released an updated set of PowerShell quick reference guides so that you always have the information you need within easy reach! [url=http://www.microsoft.com/en-us/download/details.aspx?id=42554]Windows PowerShell 4.0 and Other Quick Reference Guides Home Page[/url] [Microsoft Download Center] [url=http://www.howtogeek.com/187970/windows-powershell-4.0-quick-reference-guides-are-available-for-download/]Full Article[/url]
We occasionally host [url=http://community.spiceworks.com/spicecorps]SpiceCorps meetings[/url] at our Webroot office in Broomfield. We had Jamie from [url=http://i-t-w.com/]IT Works[/url] come and bring some printers with him to demo. He gave a great demo and brought a bunch of really cool printed examples as well as firing up his Lulzbot printer and printing us out a mini-SpiceRex. He also let us know that many libraries now have free 3D printers to use for patrons, so it's a good way to get started if you want to tinker. I had no idea that [url=https://www.lulzbot.com/]Lulzbot[/url] was a Colorado company, about an hour north of Webroot. They apparently do factory tours every Friday, where you can see them use their own 3D printers to make the parts for the new ones. Here are some of the photos I took: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/22557i1C6E355401E6B9A7.jpg[/img] [img]https://d1q
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.