Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

bit defender blocks good applications

Posted on 2016-10-05
2
Medium Priority
?
142 Views
Last Modified: 2016-10-12
Hello Experts,
This customer has an application developed in vb6 long ago...
it works fine but some of its modules... exe files with size less than 500 kb are being blocked by bit Defender...
although the modules are well known and widely used by the company...

Why is bit defender identifying those pretty small exes as a thread and what can I do ?
Besides Changing Antivirus... this customer is a loyal fan of Bit Defender and just paid for all his licenses
So changing antivirus is my last resource here.
Please your advice.
Regards
0
Comment
Question by:rguillermo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 41831150
It's probably a false positive. Typically script or macro based appl may encounter such alert. If the appl dependencies and libraries modules are indeed legit like you mentioned since it widely used in the company than exclusion or exception need to be set up or alternatively ask bitdefender support to clarify and include in whitelist if possible. You can check the file using virustotal.com (https://www.virustotal.com/) to see if other AVs also has such detection for assurance.

Exclusion - http://www.bitdefender.com/support/how-to-add-exclusions-(exceptions)-in-bitdefender-2015-1307.html
Support on legit file update - http://www.bitdefender.com/support/what-to-do-when-bitdefender-detects-legitimate-applications-491.html
0
 

Author Closing Comment

by:rguillermo
ID: 41841420
btan,
Excellent links,
Problem solved
Took us a couple of days testing,
thank you very much
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question