- Dec 12, 2016
- 1,357
It's actually really coolwait how do you run threat emulation by itself via API key and ESET? I have a check point lic but your solution sounds like the best of both worlds for those who hold both liceneses.
I don't need to do manual analysis anymore I just send files to Symantec , Kaspersky ,eset live guard advanced , checkpoint , xcitium (human analysis) ,sophos intelix and they together give an accurate answer to what's safe
Oh and I use eset with comodo as a sandboxing layer (I usually let files get trusted by xcitium from the ones that are rather then manually allowing them as it would defeat the purpose)
Hitman pro as another layer to exploit guard GitHub - neohiro/ExploitProtection: Windows Exploit Protection Settings (Ultimate) (I have disabled eset exploit mitigations )
Got avast scanning my emails for free and checkpoint , defender , Symantec as anti pishing extensions as well as quad9 as the DNS
And for the firewall I have disabled eset and using Symantec firewall, ips modusles
And one day I probably would set a hardware firewall using Cybersecurity as a Service Delivered | Sophos and feeds from crowsec and GitHub - PeterDaveHello/threat-hostlist: Comprehensive domain blocklists for threats (🕷malware, phishing, ️spyware, botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky. oh and wauzh as an edr for eset , checkpoint, Symantec sophos etc
Last edited: