Solved

bit defender blocks good applications

Posted on 2016-10-05
2
120 Views
Last Modified: 2016-10-12
Hello Experts,
This customer has an application developed in vb6 long ago...
it works fine but some of its modules... exe files with size less than 500 kb are being blocked by bit Defender...
although the modules are well known and widely used by the company...

Why is bit defender identifying those pretty small exes as a thread and what can I do ?
Besides Changing Antivirus... this customer is a loyal fan of Bit Defender and just paid for all his licenses
So changing antivirus is my last resource here.
Please your advice.
Regards
0
Comment
Question by:rguillermo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41831150
It's probably a false positive. Typically script or macro based appl may encounter such alert. If the appl dependencies and libraries modules are indeed legit like you mentioned since it widely used in the company than exclusion or exception need to be set up or alternatively ask bitdefender support to clarify and include in whitelist if possible. You can check the file using virustotal.com (https://www.virustotal.com/) to see if other AVs also has such detection for assurance.

Exclusion - http://www.bitdefender.com/support/how-to-add-exclusions-(exceptions)-in-bitdefender-2015-1307.html
Support on legit file update - http://www.bitdefender.com/support/what-to-do-when-bitdefender-detects-legitimate-applications-491.html
0
 

Author Closing Comment

by:rguillermo
ID: 41841420
btan,
Excellent links,
Problem solved
Took us a couple of days testing,
thank you very much
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows Updates 14 78
Userform to show a range in excel. 3 34
Server error: '550 5.7.1 Unable to relay' 2 30
Block iPhone USB storage on Windows 10 1 30
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Show developers how to use a criteria form to limit the data that appears on an Access report. It is a common requirement that users can specify the criteria for a report at runtime. The easiest way to accomplish this is using a criteria form that a…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question