Solved

Avita Premium Security Suite What I should do with the rule inetinfo.exe?

Posted on 2011-09-30
15
295 Views
Last Modified: 2012-05-12
Dear Experrs.

inetinfo.exe is not signed, should I have to click on Allow and Remember or Deny?
inetinfoexe.JPG
0
Comment
Question by:rebelscum0000
  • 7
  • 6
15 Comments
 
LVL 12

Expert Comment

by:marcustech
ID: 36892012
More info needed - inetinfo is a microsoft executable behind Internet Information Services, a legitimate part of windows. However in this instance it appears to be running an SMTP service, which is not normal behaviour on a Windows XP box. What is the PC in question used for and what's installed on it? In this instance I'd be inclined to let the Avira black it and re-visit the  question if anything you need to use stops working, however assuming you're running with a firewall/router on your internet connection leaving it unblocked won't be a risk.
0
 

Author Comment

by:rebelscum0000
ID: 36892181
Ok more info, but i do not understand what do you suggest me for now, Block?
programsinstalled.JPG
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36892273
Looking at that list there's nothing that needs to use the SMTP server, so yes I'd recommend BLOCK - you can always unblock later if it turns out that something needs to use the service in question.
0
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

 

Author Comment

by:rebelscum0000
ID: 36892324
the problem here is i switch from Outpost Firewall Pro to APSS
Under OPFP I know how tp  block, creates rules.... but I am still learning APPS and I do not how to unblock later if it turns out that something needs to use the service in question.
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36892434
I'm not intimately familiar with the specifics of configuring Avira's firewall, however you should be able to find details here: http://www.avira.com/en/support-documents-download/49/documents/products/pdf/en/Avira_AntiVir_Security_Suite_Firewall_HowTo_en.pdf
0
 

Author Comment

by:rebelscum0000
ID: 36892682
leaning curve... once again .. ok I have to read, because i post this question at the Avira Forum and did not reply
0
 

Author Comment

by:rebelscum0000
ID: 36928079
is this the same process?
System-Process.JPG
0
 
LVL 12

Expert Comment

by:marcustech
ID: 36929751
Nope, different process.

This looks to me like the normal windows Netbios communications.  It's part of Windows normal behaviour, although if you block it everything should still work, as name resolution will fall back to DNS.
0
 
LVL 12

Accepted Solution

by:
marcustech earned 500 total points
ID: 36929757
0
 

Author Comment

by:rebelscum0000
ID: 36946052
Ok, I will allow it, but I will never understad why System is an Unknown Developer?
Spanish: Desarrollador Desconocido
0
 
LVL 12

Expert Comment

by:marcustech
ID: 37013895
Ok, I will allow it, but I will never understad why System is an Unknown Developer?
Spanish: Desarrollador Desconocido

The System 'process' or 'application' isn't actually a single process in the way some of the others are - lots of drivers and modules from various developers are running under the System Process so the security software can't ID one developer that has signed the code.  However if your system process is compromised then you are in big trouble anyway so it's probably safe to allow that...
0
 
LVL 12

Expert Comment

by:marcustech
ID: 37013906
From Mark Russinovich:

The System process is special because it doesn’t host an executable image like other processes. It exists solely to host operating system threads for the memory manager, cache manager, and other subsystems, as well as device driver threads.
0
 

Author Closing Comment

by:rebelscum0000
ID: 37049629
Thank you very much
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

February 24, 2017 — On February 23, Travis Ormandy, a vulnerability researcher at Google, reported on Twitter (https://twitter.com/taviso/status/834900838837411840) that massive stores of data have been leaked by CloudFlare, a company that provide…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question