Toolbars are generally only detected if your have the scanning option to look for Potentiall Unwanted Applications, so make sure that is...
Are we talking about business customers is a more managed environment, or just home users that you are supporting?
If you have AD, group policy is the easiest way. Have your default configuration settings saving in a cfg.xml file in the same directory as the...
This document outlines the standard client-side exclusions along with basic AD roles like DNS, WINS, and DFS that should be excluded server-side:...
On our client side we exclude the entire directory structure under c:\windows\csc and it doesn't give us problems. It's part of the MS recommended...
You would literally have to have a quantum computer sitting inside your computer case that you are unaware of for the encryption key strength...
Ok, so what exactly is stopping you from setting up HTTP exclusions? [ATTACH]
A lot of dropper trojans are polymorphic and won't initally be caught by the scanning engine until they attempt to go out and pull down more...
Add the DB and log files to the exclusion list. Not much else to do besides that.
Program updates are supported but only seem to happen when a completely finalized version is out. The last time this happened was when all the v3...
4.2.40 compared to 4.2.64 is just bug-fixes and some added integration features for Thunderbird 3.1 and Outlook 2010. If you aren't having...
Flagging on scripts or compiled scripts like that would wreak absolute havoc with business customers. You're much better off just letting...
No, there isn't really a way to do it. I wish they would give us the option to link the hostname to the client name (unless there is a conflict,...
Ok, to clarify I am saying that if the Eset binaries were compiled to use ASLR, it would do nothing to fix your stability problems Dlls have to...
Re: NOD and DEP/ASLR - use of Enhanced Mitigation Experience Toolkit 2.0 ASLR is not going to do anything for you if you're having crashes under...
If you delete the old computer entry from the RAC, the license is freed up. If you allow name changes but not MAC address changes in the advanced...
In the advanced settings, at the bottom of the list under Email client integration, Uncheck Integrate into Microsoft Outlook. There is a one-time...
When it is doing this, open the GUI and change the display mode to "Advanced mode" in the lower left corner if it is not already, then under...
I think you can use either a netbios or FQDN and point it all towards the same port destination. It's not like this is being transported over SSL...
All clients are configured to point to the server's FQDN. The firewall is opened on port 2222 for client reporting from the internet to the...
JS means it was javascript, so likely something trying to do bad things through your browser. The Fraud part means it was something trying to...
They still have to be extracted when they are getting loaded in to memory, and the real-time scanner is going to pick that up.
Depending on how you do your system imaging or if this happens a lot, you might also want to enable computer name renaming while you are at it.
Wait, are you talking about update checks or client reporting? Those are two completely different things and the update scheduler only lets you do...
Advanced heuristics are enabled for file execution and the scheduled scan, not for all real-time scanning (default settings, basically). Conflicts...
Separate names with a comma.