Solved

Avita Premium Security Suite What I should do with the rule inetinfo.exe?

Posted on 2011-09-30
15
292 Views
Last Modified: 2012-05-12
Dear Experrs.

inetinfo.exe is not signed, should I have to click on Allow and Remember or Deny?
inetinfoexe.JPG
0
Comment
Question by:rebelscum0000
  • 7
  • 6
15 Comments
 
LVL 12

Expert Comment

by:marcustech
ID: 36892012
More info needed - inetinfo is a microsoft executable behind Internet Information Services, a legitimate part of windows. However in this instance it appears to be running an SMTP service, which is not normal behaviour on a Windows XP box. What is the PC in question used for and what's installed on it? In this instance I'd be inclined to let the Avira black it and re-visit the  question if anything you need to use stops working, however assuming you're running with a firewall/router on your internet connection leaving it unblocked won't be a risk.
0
 

Author Comment

by:rebelscum0000
ID: 36892181
Ok more info, but i do not understand what do you suggest me for now, Block?
programsinstalled.JPG
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36892273
Looking at that list there's nothing that needs to use the SMTP server, so yes I'd recommend BLOCK - you can always unblock later if it turns out that something needs to use the service in question.
0
 

Author Comment

by:rebelscum0000
ID: 36892324
the problem here is i switch from Outpost Firewall Pro to APSS
Under OPFP I know how tp  block, creates rules.... but I am still learning APPS and I do not how to unblock later if it turns out that something needs to use the service in question.
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36892434
I'm not intimately familiar with the specifics of configuring Avira's firewall, however you should be able to find details here: http://www.avira.com/en/support-documents-download/49/documents/products/pdf/en/Avira_AntiVir_Security_Suite_Firewall_HowTo_en.pdf
0
 

Author Comment

by:rebelscum0000
ID: 36892682
leaning curve... once again .. ok I have to read, because i post this question at the Avira Forum and did not reply
0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 

Author Comment

by:rebelscum0000
ID: 36928079
is this the same process?
System-Process.JPG
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36929751
Nope, different process.

This looks to me like the normal windows Netbios communications.  It's part of Windows normal behaviour, although if you block it everything should still work, as name resolution will fall back to DNS.
0
 
LVL 12

Accepted Solution

by:
marcustech earned 500 total points
ID: 36929757
0
 

Author Comment

by:rebelscum0000
ID: 36946052
Ok, I will allow it, but I will never understad why System is an Unknown Developer?
Spanish: Desarrollador Desconocido
0
 
LVL 12

Expert Comment

by:marcustech
ID: 37013895
Ok, I will allow it, but I will never understad why System is an Unknown Developer?
Spanish: Desarrollador Desconocido

The System 'process' or 'application' isn't actually a single process in the way some of the others are - lots of drivers and modules from various developers are running under the System Process so the security software can't ID one developer that has signed the code.  However if your system process is compromised then you are in big trouble anyway so it's probably safe to allow that...
0
 
LVL 12

Expert Comment

by:marcustech
ID: 37013906
From Mark Russinovich:

The System process is special because it doesn’t host an executable image like other processes. It exists solely to host operating system threads for the memory manager, cache manager, and other subsystems, as well as device driver threads.
0
 

Author Closing Comment

by:rebelscum0000
ID: 37049629
Thank you very much
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now