Raynor

Member
  • Content Count

    99
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Raynor


  1. I've been playing around with EEC in a virtual machine prior to possibly deploying it in our company.
    A few questions and issues have arisen:

    1) (See attached screenshot 1)
    For testing purposes, I have deleted all groups under "Polices-->Computers-->Groups"
    except the "New Computers" default group.
    Now I can't create any new groups, because the "clone" option is greyed out in all context menus
    and there is no "new" option anywhere.

    2) (See attached screenshot 2)
    Why on earth is there a "Scanner Settings" section under Settings-->Options?
    I thought that all the settings for the clients, including the scanner settings would be configured via policies!
    And the same scanning options are indeed (as expected) present in the policies.
    To top it off, there is no mention of this section in the help or the manual :blink:

    3) How often does the Update Proxy update its data? (signatures and downloadable EAM program updates)
    I can find nothing about this in the manual.

    Thank you in advance!
    Raynor

    Computers.png
    Download Image

    Settings.png
    Download Image


  2. On 2/19/2018 at 6:09 PM, GT500 said:

    This option is fine. Windows should automatically turn off Windows Defender when the protection is turned on in Emsisoft Anti-Malware.

    That being said, if you want to try to disable Windows Defender, then feel free to do so. Just keep in mind that Microsoft keeps making it harder and harder to do so (at least on Windows 10), and that Windows may randomly re-enable Windows Defender.

     

    Just to let you know, Windows Server 2016 does NOT automatically turn off Windows Defender when Emsisoft Anti-Malware gets installed.
    It does nothing. It doesn't even lift a finger. Zip. Nada. :lol:
    I just tried it in a virtual machine.

    More info to corroborate my findings here:

    https://partnersupport.microsoft.com/en-us/par_servplat/forum/par_winserv/disable-windows-defender-on-server-2016/3b19d95c-0969-44ba-b9c1-e348be7a7a98

     

    So, that leaves me with 2 options:
    - Powershell:  Set-MpPreference -DisableRealtimeMonitoring $true
    - Or removing Windows Defender completely (Add/Remove Roles&Features Wizard)

    I haven't decided what to do yet ... hmmm ...

     

    Oh, and one more thing:

    While the Anti-Malware Download page now lists Server 2016 as supported, the Enterprise Console download page does NOT (Server 2012 R2 only) (???)
     

     


  3. We are considering deploying EAM with EEC in our company in the near future.

    One thing that I am really worried about is that (if i'm not mistaken) at the moment there is always
    an option for users to skip the "suspicious program" alert popups of the behaviour blocker module.
    In other words, users could always choose to manually allow the action taken by a suspicious program.

    Why is this a problem? Well, users tend to be dumb, and clicking on "Allow" (or, as it is called starting
    with EAM version 2018-02 "Wait, I think this is safe") would allow a malicious program to run and infect
    our network, rendering the AV useless...

    Believe me, people really do click on stuff without knowing what they're clicking. It's ridiculous but true!

    We absolutely need to lock down all client PCs, with users not being given any way to manually allow suspicious program activity.

    At the moment, the only two options for the behaviour blocker are "Allow" and "Auto resolve with notification".

    I would kindly suggest to add a third option named something like "Always auto resolve (no allow option)" that
    still shows the suspicious behaviour alert to client PC users, but provides them with no way to cancel the
    auto resolve (quarantine, etc.) action.

    This is the one and only issue that keeps me from being 100% certain that EAM is the best option for our network :unsure:.

     

    If I got it all wrong, and there already is a way in EEC to configure the alert popup in the way described above,
    I would like to apologize for wasting everybody's time :lol:

    Thanks,
    Raynor


  4. One more Question:

    What are your "official" recommendations concerning Windows Defender on Windows Server 2016
    when EAM is to be installed on the Server ?

    A) Remove Windows Defender completely as a feature via the "Add Roles and Features" wizard ?

    B) Leave it installed, just disable realtime protection via the following Powershell command:
    Set-MpPreference -DisableRealtimeMonitoring $true

    C) Leave it installed, do nothing, as Windows Defender gets disabled automatically by EAMs Installer?
        (does it ??? if so, only the realtime protection???)

     

    Thank you
    Raynor


  5. Thank you.

    We are planning to deploy EAM on a Windows Server 2016 that uses "classic" MBR-style legacy boot,
    so I assume that there will (hopefully) be no problems....

    One more thing: Is there any difference between the installer that you can download from
    the "normal" EAM section of your website and the installer that can be downloaded from the "EAM for Server"
    section ?


  6. On 10/6/2017 at 11:41 PM, Frank H said:

    Hi,

    We are currently updating the manual, as it might be a bit confusing here and there.
    Best practice is when you check the batchfiles yourself and see what they do, it's not that special, and apply that in your GPO.

    Yes, it is indeed a bit confusing, that's what I noticed as well.

    But back to my question: So it is possible to set everything required on the Server via GPO,
    so that all the clients are automatically configured via the GPO they get from the sever, right ?

     


  7. Thank you,
    now it's clear to me.

    One more thing:
    If you look at Page 83 and the following pages of the "Getting Started" user guide (see attached screenshot),
    instructions are given there on how to configure a couple of Group Policy settings on the server (mostly firewall execptions).
    I am talking about "Allow inbound File&Printer Sharing", "Allow Remote Administration", "AllowICMP",
    and "Enable Remote UAC LocalAccountTokenFilterPolicy".

    This is the way I would plan on preparing everything. Would setting all these GPOs on the server (for all client computers)
    be enough, or would it STILL be necessary to run a batch script file  Prepare_PC_for_Deployment.bat) on a client PC ?

    Serverconfig.png
    Download Image


  8. 1 hour ago, Frank H said:

    The EEC service performs all actions, like deploy, and therefore needs to impersonate on the server, as local admin.

    this is the -Local administrator- account.

    So, If I understand you correctly, the Windows Server 2016 LOCAL Administrator account would have to be entered here,
    so that the EEC service can run in the background on the server with Admin privileges , even when no user is logged on, right ?

     

    1 hour ago, Frank H said:

    The EAM installer requires a local admin account to be able to run.

    This is the -Remote Administrator account for selected computers-

    This I do not fully understand. If you look at the screenshot it says "Domain\User:" at the top just under "Remote Administrator Account".
    But we do not use domain administrator accounts (i.e. users with administrative rights listed in Active Directoty), just the normal users have domain user accounts.
    There is just a local admin on every PC, (the admin-like user created during the Windows installation).

    How would I enter that user ? Just the Username, without any Domain name in front of it?
     

    1 hour ago, Frank H said:

    Please note that you need to run a prepare batch script on the target clients, which you can find in the folder C:\Program Files\Emsisoft Enterprise Console\server\Scripts

    There are 2 batchfiles:

    Prepare_PC_for_Deployment.bat
    Prepare_PC_for_Deployment_UAC_Disabled.bat

    The latter one needs to be run when UAC is disabled on the client.

    Well, The local admin (which will be used to start the scripts) is just the admin-like user created during windows installation, as mentioned above.
    So UAC should be active for that user (as that user is nor a "real" admin and just gets its privileges elevated when required).
    So I would just run the first script, right ?

    Thanks again and best regards
    Raynor


  9. First of all, sorry for this noob-like question ;)

    I am currently evaluating if Emsisoft Enterprise Console (combined with EAM) might be a future option
    for our small business network (one Windows Server 2016, mainly used as file server, Active Directory domain,
    about 30 client computers). EEC would be installed on our Win 2016 server, EAM on all of the clients.

    So far, I have skimmed across the EEC manual (we have not installed anything yet / decided on buying anything yet).
    And while most things seem pretty clear to me, there is one thing I can't get my head around:

    What is meant by Remote & Local Admin credentials (see screenshot)?

    Our 30 or so client computers all have a local admin account that is used for all admin purposes concerning the client PCs.
    I am talking about the "admin-like" local user account that is created during a standard windows installation
    (the one you get to choose a user name for), NOT the "Administrator" account (which is disabled by default, and still is).

    Users logon their computers with domain user accounts that only have user privileges (no roaming profiles or other fancy stuff).

    And, of course, the server itself has its own (local) Administrator account, which is used when administering the server.
    That's about it.
     

    So what would have to be entered for Remote & Local Admin ?
    Do both fields have to be filled in ?
    If so, why ?

    Yes, I know it's a beginner's question (sorry), but right now I'm a bit stumped ;)

    Thanks
    Raynor

     

     

     

     

    Admins.png
    Download Image


  10. After more digging around for possible causes, it turns out that the Windows 10 Indexing Service is the culprit.

     

    I found it odd that the freezing only occurred on the HDD containing my data (which was added to the indexed locations),

    and not on my system HDD. So I removed my data HDD from the Windows Search index and the freezing is gone.

     

    I also found a thread on www.tenforums.com yesterday that pointed me towards the indexing service:

    http://www.tenforums.com/general-support/65418-sometimes-file-explorer-freezes-when-renaming-folder.html

    Quote: " I think this is related to Windows Search as I have seen this issue complained of on other sites but so far the only

    workaround is to turn off Search. [...]"

     

    I'm not sure why the problem also seemed to have disappeared after uninstalling Emsisoft Internet Security, but maybe

    that just happened by chance, possibly the Indexing Service was not running/performing any indexing at that time,

    or some similar combination of circumstances.

     

    Anyway, please let me sincerely apologize for raising this false alarm. :o

     

     

    Thanks and all the best,

    Raynor


  11. When I create a new folder in the Windows Explorer via right-click and then immediately enter a name

    for the folder before hitting enter (and thus creating the folder), Explorer sometimes freezes directly after hitting enter.

     

    Then I am left with two options:

     

    a) Trying to close the frozen Explorer window. This makes Explorer crash and the whole shell & task bar etc. is restarted.

    Result: The folder is created, but NOT renamed (i.e. it is still called "New Folder")

     

    b) Just waiting for a minute (or so). Then the folder is created AND renamed successfully.

     

    When I uninstall Emsisoft Internet Security, the problem goes away. Folders can be created and renamed without any Explorer freezes whatsoever.

     

    My gut feeling tells me that the ransomware protection part of the behavior blocker might prevent the folder from being renamed.

    In other words, the ransomware protection might be a bit too overzealous here...

     

    Is my gut feeling pointing me in the right direction?

     

    I am using Win 10 x64 v1607 and  EIS 12.01.xxxx (latest version)

     

    Thanks,

    Raynor


  12. Thank you, I will use this as a workaround from now on.

     

    And I will most definitely be keeping my fingers crossed hoping that the hardware ID derivation

    algorithm can be toned down a bit in the future, so that hotswappable SATA HDDs

    can be used without any license reactivation prompts ...

     

    Again, I'm just talking about adding (and later removing) one measly additional HDD,

    not changing the whole HDD config ...

     

    :unsure::)^_^

     

    Best regards,

    Raynor


  13. First of all, sorry for digging up this thread again :P

     

    I just wanted to say once again that this issue is still rather annoying for me when doing backups using hot-swappable HDDs.

     

    I event tried shutting down the protection (using the tray icon menu), but even then it would revert to a trial license, thus forcing me to reenter

    my license after finishing the backup (after removing the backup HDD).

     

    Is is possible (in the future) to implement one of these workarounds:

     

    1) Why don't you just use the FIRST (system) hard disk to generate a hardware ID and skip additional hard drives? That would solve the issue,

    as adding and removing additional SATA drives triggers the license reactivation, whereas the system disk is of course not changed.

     

    2) Temporarily disable the hardware checks while the protection has been shut down. That would at least enable me to temporarily shut down the protection

    before the backup and reenable it afterwards.

     

    After much thinking about the whole issue (after all, I'm always srminded of it whenever I perform a backup :unsure::wacko:)

    I am still of the opinion that it is fairly wrong to make it hard for users to use hot-swappable SATA hard disk drives for backup (or similar) purposes.

    The "use an USB drive" recommendation just doesn't cut it, sorry :excl:

     

    So please let me finish by kindly asking you to at least think about implementing a workaround (or fix) for this issue.

     

    Thank you and all the best

    Raynor


  14. Unfortunately, I am a bit short on time right now. I have switched back to the delayed feed for the time being.

    I can't experiment with betas / debug logs right now. The firewall issue has already eaten up enough of my time :unsure:.

     

    You guys should really be able to reproduce the issue, as four people have already confirmed it.

    (Me, "fax", "Aura" and "herisson" in this thread http://support.emsisoft.com/topic/22472-firewall-blocking-things-it-shouldnt/).

     

    Use Win 10 x64 (fully updated), set the firewall to "always ask" (i.e. turn off automatic rule creation for both signed and unsigned apps),

    and have recurring popups for different ports on program startup even though "allow always" was already clicked multiple times before

    and there already is a "allow all" rule for that program.

     

    IF there should really be a need for further debug logs etc. I might be able to provide them at some later time perhaps,

    but right now I'm on the delayed feed and out of time :wacko:.

     

    Sorry, and thanks for your understanding :unsure:

    Raynor

     

    EDIT: Thanks @Aura for providing the logs, makes me feel less bad :)


  15. It's unusable due to constant firewall messages for all my local software despite clicking 'allow all'. I've had to restore my system to get back to a previous release then it automatically updated anyway.

    As ever since OA was dropped it is very high maintenance.  I have now gone back to the 'delayed' release which is supposed to be stable but of course it's not as it has the firewall issues so I've had to switch it off again. I cannot switch off updates!

    I await a 'stable' release to test again.

     

    Thanks for another confirmation of this issue. I was having the exact same issue with the BETA. I also had to switch back (to the delayed feed).

    See this thread for more info:

     

    http://support.emsisoft.com/topic/24430-beta-11906513-network-issue-solved-but-now-pesky-recurring-firewall-alerts/


  16. With the new beta, the network connectivity issue (homegroup and normal network shares inaccessible) that

    has been discussed here quite a bit recently is solved for me as well. I can access my network shares again without disabling

    the EIS firewall.

     

    BUT:

     

    Now I'm getting constant, recurring and thus very annoying firewall alerts whenever I start Firefox.

    Clicking on "Allow all connections" does not help, I'm getting an alert again (for another port) the next time I start Firefox.

    Please see the attached screenshots 1 & 2 for reference.

     

    Note that my Firewall is set to "ASK" for all connections in the automatic rule settings in the advanced configuration

    (all four dropdown fields are set to "Ask").

     

    Also note that there already is a rule for Firefox allowing all connections, inbound and outbound (see screenshot 3).

     

    I also get a similar alert for Logitech SetPoint on Windows startup.

     

    Seems like the fixes in the beta have turned the firewall into something a bit too overzealous :P

     

    EDIT: This also happens when starting Mozilla Thunderbird.

     

    EDIT #2: This quickly became so annoying that I had to switch back to the stable version (now the alerts are gone again - as expected).

    Having to disable the firewall for the time being is less of a hassle than getting bombarded with firewall alerts. :blink:

    This Beta is a dud :D:lol:

     

     

    Thanks and all the best,

    raynor

     

    PS: My OS: Windows 10 x64

     

    post-37542-0-28163400-1467232617_thumb.png
    Download Image

     

     

    post-37542-0-32428400-1467232622_thumb.png
    Download Image

     

     

    post-37542-0-64043600-1467232626_thumb.png
    Download Image