Anti-Virus AppsSponsored by jamf

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

I am trying to install and configure a Symantec 14 endpoint manager  antivirus. I have already installed the manager and also i created client and i pushed it successfully.

My problem is that the Symantec manager is look like the image 1 and not like the image 2 which i found in internet (I attached both images).
What is going wrong? also Where can i find a step by step complete installation guideline?
1.png
2.png
0
Introducing Cloud Class® training courses
LVL 12
Introducing Cloud Class® training courses

Tech changes fast. You can learn faster. That’s why we’re bringing professional training courses to Experts Exchange. With a subscription, you can access all the Cloud Class® courses to expand your education, prep for certifications, and get top-notch instructions.

Dear Experts

Iam looking for good antivirus/anti spam and other protection software for the recently purchased dell latitude 3940 with windows 10 would like to subscribe for good one can you please suggest which one to go for, thanks in advance. mcafee total protection is slightly cheaper compared to mcafee business security please suggest.
0
Hi Experts,
2 strange things suddenly happening to my PC's
1- The task manager got disabled
2- when I type in something then right click to select that work for spelling, it loses the selection.
Any reason behind these..?
0
can an installed .exe file on windows os see all my key strokes
I have a custom made .exe file that appears to me to run correctly
but may have additional secret permissions

by installing any program
could a keylogger be built in

dont just tell me to run virus scan
1
https://www.bleepingcomputer.com/news/security/backswap-banking-trojan-uses-never-before-seen-techniques/

Referring to above  BackSwap Banking Trojan ,  does McAfee AV & IPS detect/block it?
Think I saw a link (but misplaced it) that McAfee AV can't detect it yet.

Is there alternative ways of detecting/blocking it if AV can't?

What is the hash or IOC for this malware?
0
Mailwasher Pro
Tutorial: In this part of my series, I'll be explaining how to set up an IMAP connection in Mailwasher and Outlook and also explain the differences of how Mailwasher handles POP and IMAP connections. Enjoy!
1
 

Expert Comment

by:Nick Bolton
Comment Utility
Excellent, I think a lot of users get stuck on the email settings parts and what they mean, so this guide makes that a lot clearer.
1
 
LVL 18

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comments Nick and I'm glad you approve. I'm writing these articles so that people can learn to use the power of this tool and enjoy it's functionality just as I have been for so many years.

Regards, Andrew
0
Mailwasher Pro
An explanation of How the Recycle Bin works and how to configure it so that it works for you just as you want. Enjoy!
1
 

Expert Comment

by:Nick Bolton
Comment Utility
Thanks again Andrew, you write so well!
1
 
LVL 18

Author Comment

by:Andrew Leniart
Comment Utility
Thank you very much for the kind compliment Nick!

If you would be so kind as to endorse the article by clicking the thumbs up at the bottom of the article, (to the left of the word comment) I'd very much appreciate it :)

Part-4 of the series is almost written and will be published soon!

Best regards,

Andrew
0
Hi, I have updated windows 10 now but i'm getting above message  and i don't know how to ignore this. any idea how to to that.
Many Thanks

Error
0
Mailwasher Pro
Part 2 of my series about Mailwasher Pro. Learn about what Mailwasher is and how to massage this tool to your own specifications with some powerful configuration options that many users overlook, and by doing so, you can, like me, enjoy a totally spam-free inbox. Enjoy...
1
 

Expert Comment

by:Nick Bolton
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.
0
 
LVL 18

Author Comment

by:Andrew Leniart
Comment Utility
A great follow on from Part 1 on how to get the spam filters to work for you.

Thanks for the kind comment Nick and once again, welcome to Experts Exchange! Watch out for Part-3, being written now and will soon be published.

Best...

Andrew Leniart
0
I am trying to confirm whether Sentinel One EndPoint Protection is a viable replacement for existing Webroot EndPoint Protection and MalwareBytes EndPoint protection.  We have been using Webroot/Malwarebytes endpoint clients on our workstations and servers for about four or five years now.  We have not encountered any compromises/issues using these products.   I also need to mention we also use Cisco's Umbrella Roaming Client as well.

We also have a SonicWall TZ500W with the Comprehensive  Gateway protection.  We never enabled the DPI module because it caused many connection issues accessing creditable Court websites, etc.  

So now SonicWall is promoting/offering their Capture Client solution that I am interested in.  I wanted to purchase the Sentinel One client software a couple of years back, but they said I could not make a purchase since the minimum count they could sell is 100.  We only need 25 licenses.  So now that Sonicwall offers Capture Client, I want to know if its feasible to say it would actually replace both Webroot and MalwareBytes EndPoint products and not just work along side and complement them.  So, I contacted Sentinel One Sales and they indicate their product serves as direct replacement.  They also mentioned their clients actually use Capture Client exclusively.

I have concern about a complete replacement solution.  I just want to ensure if we decide to deploy Sentinel One Capture Client as the sole Anti-Virus and Anti-Malware solution it …
0
How do you know if your security is working?
LVL 1
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

Mailwasher Pro
Mailwasher Pro by Firetrust is powerful anti-spam utility, ideal for managing both POP and IMAP connections. Read this series of articles to learn how to setup and take advantage of its great features!
1
 

Expert Comment

by:Nick Bolton
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!
1
 
LVL 18

Author Comment

by:Andrew Leniart
Comment Utility
Great introduction to setting up and getting started with MailWasher Pro. Thanks Andrew!

Hi Nick and welcome to Experts Exchange! Thank you for your kind comment and also for endorsing the article with a thumbs up. That means a lot to me so much appreciated.
0
Has anyone implemented a rule on  ESET ERA Admin Portal which blocks USB devices but still allows phones to be charged?
0
I have a requirements to block only 3  Tcp ports on 50 PCs (in 25 branch offices) :
these PCs run a stripped-down DB2 services & I only want PCs in the same subnet
to connect to it.  The Tcp ports are  523, 8000, 50000.

We would like to use McAfee endpoint security (ver 10.5) to do this blocking.
Can someone give me step by step (screen by screen) instructions to do this?

These 25 branches are in the subnets (with their default gateway 10.2.X.1)
10.2.2.0 /24  ==> so permit only  10.2.2.X to connect to its 3 ports above (incoming Tcp)
10.2.3.0 /24  ==> so permit only  10.2.3.X to connect to its 3 ports above (incoming Tcp)
. .  .
10.2.27.0 /24  ==> so permit only  10.2.27.X to connect to its 3 ports above (incoming Tcp)


Using Windows 7 Firewall is not an option for us (for some reason).
0
Hi,
newly installed and joined to domain windows 2016 server
showing strange message during boot :-)
wtf is this?conficker infection or normal  windows boot message :-) ?
0
What's Symantec EndPoint protection cmd can i execute to remotely force client to update latest configuration and definition ?
0
We are contemplating whether to use McAfee endpoint security's firewall or Windows firewalls
on our 30+ branches : the branches have some crucial Desktops running database services:
though the branches (ie spoke) connect back to our DC (ie hub), potentially some branches
may have their own broadband (or even just via 4G).

It's a debate between our Windows Desktop & our Firewall admins which one to use.

I know in previous Deep Security, I will have to create numerous 'policies' : one for each
branch though the branches have the same desktops running database services listening
on the same ports and when I upgrade the agents centrally from the EPO, had run into
issues:  modules (eg: Firewall or File Integrity Monitoring) that are not enabled previously
(say for servers), got auto-enabled.

So not sure if McAfee Firewall has similar or any other issues: kindly elaborate
0
AV software best compatible with O365. Any suggestion? Local outlook emails? Thanks
0
I downloaded Sophos, but am not sure it's the best I can use on my Android.
0
1. Is it recommended to have both Windows Defender and
     Symantec EndPoint Protection running at the same time ?

 2. If not, how can I setup my MDT image
    so it does not deploy Windows Defender ?
-----------------------------------------------
Environment
  ** Windows Server 2012 R2 test domain
  ** Symantec EndPoint Protection deployed
       to Windows 10 Pro client via MDT image
0
Protect Your Employees from Wi-Fi Threats
LVL 1
Protect Your Employees from Wi-Fi Threats

As Wi-Fi growth and popularity continues to climb, not everyone understands the risks that come with connecting to public Wi-Fi or even offering Wi-Fi to employees, visitors and guests. Download the resource kit to make sure your safe wherever business takes you!

A Trickbot Infestation has ravaged my network. It has wormed its way on to all workstations and servers. Does anyone know how to eradicate it and keep it from re-infecting other computers? If not, does anyone know of a company that specializes in removing this particular malware. I've tried different malware software removal tools and they identify and  remove it but it keeps coming back.
0
I have a question about Symantec Endpoint Protection.  We are trying to block USB access but are running into an issue with one of our devices.  From what I can tell, things like imaging devices are not supposed to be blocked.

However, many of our stations have ID scanners that are being blocked.  When I look in the device manager the ID scanners do show up as imaging devices.  

I'm not seeing how you white list a device.  

Thanks in advance for any help.
0
I try to install Symantec antivirus version 14 on a Windows 10 laptop and it tells me "This software is not compatible with this version of Windows". In the past I got this message when I tried to install Symantec version 12 but never on version 14, does anyone know how to bypass the error to install antivirus?
Thanks,
0
A friend is using Windows 10 (which is kept up to date).
He also has AVG Antivirus.
He normally uses Paypal for purchases (without any problems).

This morning, within an hour of using his actual Visa Debit Card on Government
website (motortax.ie) his card number was fraudulently used on some dating website.
(The bank phoned and cancelled the transaction and his card).

I'm going to run some scans tomorrow
- MalwareBytes scan in safe mode
- Hitman pro
- AVG

Any other suggestions?
0
Greetings,

I have a problem with my Windows Server 2003.  The antivirus keeps restarting the OS.  How do I fix this problem?
0
I am trying to see if there is any way to detect and stop encryption process on a windows server.

Basically one of the workstation opened a ransomware (SIGMA) and it has encrypted everything on her computer which is to be expected. However, it also encrypted everything on the mapped driver from the file server. The file-server has antivirus and even anti-ransom but it still encrypted the stuff on the mapped drives. All drives or folders that were not mapped to this particular workstation are fine.
So the question would be if there is anything to prohibit any type of encryption that is initiated from a workstation. If not, maybe someone knows a good solution to prevent this in another way.

By the way, I do have backups, however since I only have backups every 24 hours, I lots one days work. I do not really care about the files on the workstation because I simply restore a clean image but if it messes with my files on the domain server, it becomes a huge issue and I need to find some solution.

Any tip is very much appreciated. Thanks to all that are willing to assist me.
The server is Windows Server 2016
0

Anti-Virus AppsSponsored by jamf

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.