?
Solved

Are these malware or just our IT configurations?

Posted on 2015-01-29
7
Medium Priority
?
138 Views
Last Modified: 2016-02-25
Hi,
I ran a malwarebytes on my pc and it found several possible threats.  I attached the scan results here.  I wonder if these are true threats or are they configuration by our IT department.  Before i ask someone here I would appreciate an expert and check it out for me first.  Thank you.
Malwarebytes.txt
0
Comment
Question by:lapucca
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 34

Expert Comment

by:Paul MacDonald
ID: 40578383
Given that you have an IT department, it would be irresponsible of me (or any of us, really) to address this issue on their behalf.  

Is there some reason you don't trust them to properly handle a potential malware infection?
0
 

Author Comment

by:lapucca
ID: 40578395
Yes, there are 2 reason.  The previous 2 times i notify the desktop support, about malware detection in sophos, both times they reformatted and re-intall my laptop.  I don't want that.
0
 
LVL 34

Expert Comment

by:Paul MacDonald
ID: 40578405
Did they actually find malware, or was it just slash-and-burn?   Sophos can provide false-positives, after all.
0
WatchGuard's M Series Appliances - Miecom Approved

WatchGuard's newest M series appliances were put to the test by Miercom.  We had great results and outperformed all of our competitors in both stateless and stateful traffic throghput scenarios! Ready to see how your UTM appliance stacked up? Download the Miercom Report!

 

Author Comment

by:lapucca
ID: 40578457
Yes, Sophos pointed out where the malware files were, a couple of them.  I was hoping they would just remove them but they just re-image my pc.  It's a lot of work for me to re-install all my development stuff and I lost all my bookmarks too.
0
 
LVL 88

Expert Comment

by:rindi
ID: 40578469
In businesses re-imaging infected PC's makes the most sense and is the fastest option. As all data is on the servers and they have good backups, there is no need to waste time trying to find infections, or try removing them (often without really knowing for sure whether everything has been removed and fixed, or something else broken).
0
 
LVL 27

Accepted Solution

by:
davorin earned 2000 total points
ID: 40578499
First at all I must say that I agree with previous posts. They certainly have their reasons even if in most cases users don't agree with them. They must take into account whole network, not just one PC.

That entries are for forcing Classic Control Panel view and to disable System Restore configuration user interface. I'm 99,9% sure that this does part of company policy. Anyway they don't have destructive function.
0
 

Author Closing Comment

by:lapucca
ID: 40578570
Thanks everyone.
0

Featured Post

Four New Appliances. Same Industry-leading Speeds.

But don't take it from us.  The Firebox M370 is Miercom tested and Miercom approved, outperforming its competitors for stateless and stateful traffic throughput scenarios.  Learn more about the M370, M470, M570 and M670 and find the right solution for your organization today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question