Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello

Can I install Windows Defender Antivirus on Windows Server 2012R2?

if yes, how can I do this?.. where can I download  Windows Defender for Windows Server 2012R2?

Thank you for your help
0
Should you be charging more for IT Services?
Should you be charging more for IT Services?

Do you wonder if your IT business is truly profitable or if you should raise your prices? Learn how to calculate your overhead burden using our free interactive tool and use it to determine the right price for your IT services. Start calculating Now!

Is there an Anti-virus add-in for PowerPoint?
I need to be able to scan a PowerPoint file for malware, and was thinking of using an add-in, does anyone know of an add-in that has this functionality?
I was thinking the best way to scan a PowerPoint file for malware is to first renamed the file to have a zip extension, and scan those files for malware.
0
I've had a couple of people get the email with a password that they have used at one point or another in the subject line.
Of course the email goes on to claim they have video of the recipient having a little too much 'me time' while surfing porn sites & if they don't pay a bitcoin ransom, they'll send this video to all of the recipients contacts.

1) How are these people coming up with the password in the subject line? My only guess would be when sites have been hacked & 'up to X amount of users' personal information may have been compromised'. While the news is quick to mention the big instances of this, I'm sure there are a whole lot more that go unreported.

2) How is is that bitcoins & they payment of them can remain untraceable? For that reason alone, I can see banks & government not being to crazy about this.

While I've had one customer actually pay the ransom, no I don't believe such video ever existed, haha!
0
https://www.ubuntupit.com/best-linux-antivirus-top-10-reviewed-compared/

Referring to above URL, I'm looking for a realtime (ie on-access) AV for
Linux (RHEL, Ubuntu, Debian, CentOS) :
ClamAV requires something additional to be able to do on-access can.

Q1:
is Comodo free of charge?

Q2:
Can it run on RHEL, Ubuntu, Debian & container OS
& offer on-access scan without additional package?


Q3:
Can point me to where to download it & its install/user guide?

Q4:
Can we add hashes to it (when we get threat intel) so that
it can scan the extra IOCs besides virus signatures from Comodo?
0
I noticed I have Windows Defender (there's an obsure option under
"All Programs" which shows up as something like "Antivirus scan")
on my Win 7 Home PC.

Q1:
Is this the built-in Windows Defender for Win 7?  Don't recall I ever
install it

Q2:
When Win 7 goes EoSL (ie MS don't release patch for it) in Jan 2020,
can I still click "Check for Updates" to get the latest Defender's
signatures?   Till when MS will continue to offer the signatures
update?

Q3:
Does Win Defender offer  "on-access" protection or only "on-demand"
(ie has to manually trigger scan)?
0
Hello,

Please I need to Compare Microsoft Windows Defender vs. Symantec Endpoint Protection (SEP)
I need your advise to choose between Microsoft Windows Defender and Symantec Endpoint Protection (SEP)

Best regards,
0
Being new to Trend OfficeScan XG, I'm a bit unclear on a few things which are probably in common to most 3rd party virus scanners to be installed on Servers:

  1. Do I need to disable any native windows AV scanning if I install Trend AV on Server 2016?
  2. How about if installed on 2012?
  3. How about 2008?
  4. This MS document says Server 2016 "automatically enrolls you in certain exclusions.  Does that pertain to just Windows Defender ATP or 3rd party antivirus like Trend?  Do I need to manually enter all of these exclusions in the Trend OfficeScan XG list of folders to exclude? https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus 
  5. Trend referred me to this super confusing Microsoft article for Virus Scanning Recommendations:  https://support.microsoft.com/en-us/help/822158/virus-scanning-recommendations-for-enterprise-computers-that-are-runni  .  Its introduction says it's to determinine instability.  It goes on to talk about making windows less secure.  But then it seems to provide a comprehensive list of stuff that SHOULD be excluded from scanning.   Is this the proper guideline for what to exclude for servers?  

Thanks so much.  I'm a bit anxious to push out Trend and brick a bunch of servers :-)
-Mike
0
Over the last 20-30 years I have gone from Norton Corporate to Trend Micro and now Webroot SecureAnywhere. Now Webroot has followed the others. They have gone to hell. I need a console that will differentiate my Customers from each other. Need a good virus/malware package. Want to keep it simple. Are there any clear cut winners out there today?
0
Last year i moved our company from BitDefender to TrendMicro. We've been having huge performance issues with TrendMicro across the board. it Consumes a huge amount of CPU and disk access bandwidth. All of our client computers are i5, i7 with SSDs and 16GB RAM, Win 10 Pro

It seems it doesn't play nicely with DropBox and OneDrive. When we disable syncing in either DP or OD performance goes back to normal. TM Support solution is to reinstall TM but that doesn't guarantee a fix.
0
We're trying to update our McAfee Agent from 5.0.5.658 to 5.6.1.  We don't use ePO, we're in an isolated network, & have no access to McAfee downloads.  I tried creating an account to login, but it wanted a Grant Number which we didn't have.
0
Build an E-Commerce Site with Angular 5
LVL 13
Build an E-Commerce Site with Angular 5

Learn how to build an E-Commerce site with Angular 5, a JavaScript framework used by developers to build web, desktop, and mobile applications.

OMG: This is driving me crazy!!!!

A user keeps getting his AD account locked every 20 minutes.

I've googled this to death, and even reached out to our ManageEngine AD Audit techs.

In a nutshell, Microsoft isn't capturing the source machine name or IP if the logon request is not from the MS platform (linux/mac) or the authentication request isn't Kerberos.

How in the world am I supposed to figure out the offending machine?

Using this command, then stopping and starting the logon service:
nltest /dbflag:0x2080ffff

The widows\debug log reveals:
07/09 14:38:14 [LOGON] [4304] ECPHFD: SamLogon: Transitive Network logon of (null)\victim_user@ourdomain.com from (none) (via DC-2008-01) Entered
07/09 14:38:14 [LOGON] [4304] ECPHFD: SamLogon: Transitive Network logon of (null)\victim_user@ourdomain.com from (none) (via DC-2008-01) Returns 0xC000006A

"(NONE)" is NOT HELPFUL Microsoft !!!

I've ruled out that these are coming from the outside world so I'm left thinking this is a malicious internal brute force attack or a forgotten app using the user's old password.  We've shut down all of his devices and the problem persists.

#HELP!

Any ideas would be very much appreciated!

Helplessly yours,
Mike
0
I saw an error with the backup (Retrospect)

I looked at the log, and I see an odd user name, and a file that ends with DECRYPT_INSTRUCTION.HTML
It's late now, so I can't talk to anybody.
Error Log with Bad information
I'm not sure if it's Ransomware
System has Trend Micro Total Secure
Windows 7 Pro

The user had reported that the computer took longer than usual to start up.

If it is Ransomware, I assume that I should isolate the machine - Unplug from the network.

What other steps should I take?
There is a cloud backup of files
This is a workstation connected to a server

Thanks
0
BitDefender is deleting my computer ID.  Thus every time I log into various sites, I have to do two factor authentication.  Not sure what setting is called or what to look for to disable or not have it run every single night.   My computer is locked down and doesn't have any passwords remembered etc. so I feel comfortable turning this off.

Any ideas what I look for?
0
Dear Experts

We are replacing firewall to cisco ASA and planning to go for cisco AMP for endpoints, would like to understand if we go for AMP do we still need antivirus solution please suggest, thanks.
0
We had a none critical server get infected with the Cheetah virus.  I have run Sophos and Malwarebytes and neither has fixed it.  I can change the extensions manually but that will take forever.

There must be a simple solution that one of you have tried.   HELP!
0
My Google searches seem to have been hijacked

Every query comes up Search Encrypt

And the contents are not Google search results.

What's going on??
0
I have been trying to backup my Netgear ReadyNAS Duo to an external hard drive that is connected to my PC, using Syncback Free. AVG has reported many threats while Syncback is attempting to do the backup. Most of them include "SBS" in the name of the supposedly infected file. When I take a look in the location where the infected file is meant to be, I find sometimes that is not even there. For a PC that is regularly having AVG run full scans, it seems very odd that it would discover so many infected files as soon as I start a backup. Could it be that Syncback is generating files that are causing AVG to consider them to be malware?
Can anyone suggest what they think might be going on here?
AVG threat blocked while Syncback does backup
0
The user had a fake repair site appear in their Microsoft Edge - Windows 10 - Dell All-In-One.

I had them do a force-quit.  Installed MalwareBytes, which ran but didn't find anything.

Now they can't run Windows Control panels.  They get the error  "Windows cannot access the specified device, path, or file. You may not have the appropriate permissions to access the item."

How do they get control of their computer?
Appropriate-Permissions-Message.png
0
Trying to install Avast Business AntiVirus on a Windows Small Business Server 2008 until I move the server to a new machine.

Avast said that the product should install on SBS 2008

When trying to install I get the following error:  " The procedure entry point K32EnumProcesses could not be located in the dynamic link library KERNEL32.dll "

How can I deal with this error and install the software?

Thanks.
0
Rowby Goren Makes an Impact on Screen and Online
LVL 13
Rowby Goren Makes an Impact on Screen and Online

Learn about longtime user Rowby Goren and his great contributions to the site. We explore his method for posing questions that are likely to yield a solution, and take a look at how his career transformed from a Hollywood writer to a website entrepreneur.

A customer is receiving the following threat detections on a particular PC using Symantec Endpoint Protection Cloud. Turns out they purchased licenses for this product through CDW 6 years ago and do not have an active support agreement with Symantec so going directly to them for this isn't an option unfortunately.

Resolved Threats:
No risks have been resolved
Unresolved Threats:
Trojan.Gen.MBT
 Type: Anomaly
 Risk: High (High Stealth, High Removal, High Performance, High Privacy)
 Categories: Virus
 Status: Remove Failed
 -----------
 1 Infected File
D:\DHL_Label_Scan _  June 19 2019 at 2.21_06455210_PDF.exe - Failed
 1 Browser Cache
Heur.AdvML.C
 Type: Anomaly
 Risk: High (High Stealth, High Removal, High Performance, High Privacy)
 Categories: Heuristic Virus
 Status: Remove Failed
 -----------
 1 Infected File
D:\DHL_Label_Scan _  June 19 2019 at 2.21_06455210_PDF.exe - Failed
 1 Browser Cache


The problem here is, there is no CD/DVD in the optical drive and there is no Drive D: on the machine at all for that matter -- see attachment. I do recognize the filename as it was an attachment included in a spam email that was never opened and has since been deleted from the end users mailbox.

Any ideas on how to clear these alerts?.. I've cleared the cache on the machine, deleted temp files in Windows, ran full scans with Symantec that come back "clean" but as soon as you reboot, the threat detection pop ups come back.

Thanks-
st2.png
pieceofshit.png
0
I need malware protection for an older Windows Server:

The user has an older Windows Server:
Windows Server Standard FE, Service Pack 2  Copyright 2007

Is this a Small Business Server 2008?

What can I use for Virus, Malware, and Ransomware protection?

I have a license for Malwarebytes Endpoint Protection, but I can't locate a version of Malwarebytes that supports this system.

This server will be migrated soon.  I need to protect it for a while.
Thanks
1
We have a system with around sixty computers and three servers and we are infected with the trickbot virus. We have taken everything offline and cleaned a number of computers but when we add another computer to the network now even though we think the computer is clean it and the other computers become inflected again. We use Sophos but that doesn't seem to fix it.

We are looking for some advice on the best way to deal with this nasty virus

Thanks in advance
0
I have inherited a client who uses BitDefender GravityZone for antivirus etc.

The problem is that no one knows any usernames or passwords for the admin console. I can access the local gravityzone server (which runs as a vm) using the bdadmin account but there is no way or viewing/resetting the user accounts.

How do i get access to this console?

Any suggestions?
0
Hello,

I get this message "this might be a phishing message and is potentially unsafe" in my outlook 2010 from a trusted user.  I know I can just click on it  and accept "enable all links", but I want to know how can I look in the email and see if any phishing  is done? or how to note if its a "fishy" email received.

Thank you
0
Mysterious Z: drive in Windows 7.  Client called today with Excel files missing from documents and instead all of the files he had deleted some time ago returned.  I have removed the unwanted files, no problem there.  The missing files were in the apps\roaming\Microsoft\network folder.  This is a stand alone PC, what would move them?  Next I noticed a Z: drive???  The drive has the same physical space used and capacity of C:, but doesn't have the same contents.  The Z: drive doesn't appear in the registry or Disk Management.  There is not 2 physical drives in the machine.  Norton is the AV and failed to detect (Full scan) Poweliks.  Roguekiller, ADWcleaner and virustotal.com website detected the virus.  I believe things are cleaned up now, but still suspicious of this Z: drive.  It only contains log files and copy of PDF files (From documents).  The logs are were updating as of this morning.  They don't appear to be updating this afternoon yet (Post removal of virus).
0

Anti-Virus Apps

22K

Solutions

23K

Contributors

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.