Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
ESET
Configure ESET as default-deny (bye ransomware!)
Message
<blockquote data-quote="davisd" data-source="post: 820973" data-attributes="member: 77647"><p>The people asking for wildcard support in HIPS goes way back to like 5+ years ago already, still not available, it's ridiculous. I believe they don't want to do it, since more and more other AV products go stupidly-simple-mode, without user intervention needed when threats are found, as statistics say globally, people make wrong decisions answering on prompts etc, so I doubt they are going to make Eset more complex in advanced settings which you can configure already, lets not forget Eset is just an "Antivirus", so it was never meant to make these type of crazy HIPS rules, but only AV suite which I can think of can be configured to archieve this type of system lockdown is Kaspersky. Every Eset user wanting to play with HIPS is just 3-4 clicks away of completely bricking their system as making too generic rule you won't be able to boot, notifications goes 800+ in few seconds, and all system just crash, so percentage of failure rate making wrong rules is very high, and Eset forums would go totally bonkers.</p><p></p><p>I don't really like Eset suggestions of ransomware protection by making "child proccess" denial rules, but they are meant for business products, so. I don't really know what vuln list ERP has, I have my own made over time, but I believe every rule and line must be specifically adjusted for each user system accordingly, to not brake the systems functionality depending on the user needs and programs used daily. For regular home users, one can deny most commonly abused, like wscript, cscript, powershell, etc. ~5-10 rules in Eset HIPS which is not hard, by greatly reducing attack chain vectors.</p></blockquote><p></p>
[QUOTE="davisd, post: 820973, member: 77647"] The people asking for wildcard support in HIPS goes way back to like 5+ years ago already, still not available, it's ridiculous. I believe they don't want to do it, since more and more other AV products go stupidly-simple-mode, without user intervention needed when threats are found, as statistics say globally, people make wrong decisions answering on prompts etc, so I doubt they are going to make Eset more complex in advanced settings which you can configure already, lets not forget Eset is just an "Antivirus", so it was never meant to make these type of crazy HIPS rules, but only AV suite which I can think of can be configured to archieve this type of system lockdown is Kaspersky. Every Eset user wanting to play with HIPS is just 3-4 clicks away of completely bricking their system as making too generic rule you won't be able to boot, notifications goes 800+ in few seconds, and all system just crash, so percentage of failure rate making wrong rules is very high, and Eset forums would go totally bonkers. I don't really like Eset suggestions of ransomware protection by making "child proccess" denial rules, but they are meant for business products, so. I don't really know what vuln list ERP has, I have my own made over time, but I believe every rule and line must be specifically adjusted for each user system accordingly, to not brake the systems functionality depending on the user needs and programs used daily. For regular home users, one can deny most commonly abused, like wscript, cscript, powershell, etc. ~5-10 rules in Eset HIPS which is not hard, by greatly reducing attack chain vectors. [/QUOTE]
Insert quotes…
Verification
Post reply
Top