Avatar of ROBERT MECHLER
ROBERT MECHLERFlag for United States of America

asked on 

Some newly deployed exe's are flagged by Panda (anti-virus) and won't install

Our product consists of multiple exe's written in PowerBasic and just recently Panda endpoint anti-virus and anti-malware has started objecting to them and considering them malware and quarantining them Not all just some. An executable directory might have over 100 exe's and 99% are fine. What way is there to avoid AV false positives.
Anti-Virus AppsInstallation

Avatar of undefined
Last Comment
ROBERT MECHLER
Avatar of ROBERT MECHLER
ROBERT MECHLER
Flag of United States of America image

ASKER

Powerbasic produces machine code when compiled.
ASKER CERTIFIED SOLUTION
Avatar of Paul MacDonald
Paul MacDonald
Flag of United States of America image

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Avatar of ROBERT MECHLER

ASKER

We use virustotal.com to scan for infection. Powerbasic compiles winapi to near machine code. I'm not sure what code-signing is. I've read about manifests and compiling that in as a resource per program but with 100's of exe's in the field with no problem seems unnecessary to do that to all the programs. We often write many custom programs that only one customer would ever use. Very possibly that is a problem. 
Avatar of ROBERT MECHLER

ASKER

Panda answer would probably be a whitelis entry. With Carbon Black, they say in their forum to apply a digital signature to get rid of the issue.
Avatar of ROBERT MECHLER

ASKER

Code-signing solved the problem. 
Anti-Virus Apps
Anti-Virus Apps

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

23K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo