- Dec 14, 2018
- 643
Hi,for me the problem still here
Since you are using osarmor together with WVSX. We will try to see if we can resolve it. Or you can just use one AV at present.
Hi,for me the problem still here
"We reproduce the issue. It shows the network provider's path instead of the name, but having no effect on network connection. We will try to figure it out and fix.
I updated my WVSX 3.0.3 with that new 3.0.5, just overwriting and did not get that issue (Win10 Pro)
I tried the same on WIn10 Home and got the issue reported ~ as soon as WVSX real time protection is switched off & PC restarted the issue disappears. At the moment I'm only using WVSX as a secondary scanner, and it looks a cosmetic bug anyway, so not really a problem.As above on Windows 10 Home
Regards Eck
as soon as WVSX real time protection is switched off & PC restarted the issue disappears
Actually, we improved the performance of behavior detection when opening browsers like EDGE and Chrome, since many child processes will be created while they are working. I thought the opening speed would be faster instead of slower.Hi I just manually upgraded to version v.3.05 ( overwriting ) from version v.3.03 no major gripes to report on win 10 pro x64 ( 21h2 19044.1566 ) the only thing that is noticable , is that startup is laggng a few seconds more , same goes for opening chrome and brave in regards to previous version. I am not running any other security software in realtime....
for me the problem still here
We created a rule like you said, no problem found, see screenshot below,Hi @WiseVector,
I'm testing WV as a standalone security software (no Windows Defender nor Windows Firewall, no another AV - firewall, nothing, just pure WV alone).
For my test I'm using two drives with several partitions (Windows 11 is installed on C:, and partition P: has a mix of safe and unsafe software).
My WV test starts with the WV firewall.
I created a firewall rule (network-type-rule) named "A", where "Program Path: Default Any" and "Program Path(Exclusions): C:\*.*│P:\Safe01\*.*". I expect to block all internet connections except C: and P:\Safe01. Please, my questions:
1) Specifically for my test with WV firewall rules ("A"): Do you have any recommendations, improvements additions, corrections etc?
2) At "Program Path(Exclusions):", is it right to use "*.*"? Or "*.exe" is the correct command line syntax?
3) What about sub-folders? At my "A" rule, will "Program Path(Exclusions): C:\*.*│P:\Safe01\*.*" include all sub-folders inside C: and P:\Safe01?
4) In my test, C: and P:\Safe01 are exceptions to rule "A". But I also have "WV settings => Other => Firewall Settings => Firewall Level => High Security". Please, I want to understand how my "A" firewall rule coexists with my "High Security" firewall setting level. I don't want rule "A" to be applied to C:, but I want WV firewall "High Security" level to be applied to C:. Is that right?
5) What is the hierarchical behavior between WV settings and WV rules when they conflict? Which one has more elevated permissions?
6) At P:\Unsafe02 I have an unsafe software, WV detected it, and I created an exception for it (allowing it to run). In this case, does my "A" firewall rule work? If WV detects a malware/virus etc, the user creates an exception for it, but the user has a WV firewall rule such "A", how the WV malware/virus exception coexists with the "A" firewall rule? Will the WV malware/virus exception allow its access to the internet?
At Comodo Firewall (@cruelsister version) I can allow a malware/virus to run (exception for "containment"), but I can totally block its connections (incoming, outgoing) with the Comodo firewall. However, I did same test with WV, I added a WV malware/virus exception + a WV firewall rule "A" (in order to block P:\Unsafe02 network activity), but WV didn't block its internet connections. I'm sure the problem is on my side, perhaps @WiseVector you can help me to learn how to configure the "A" firewall rule. As I explained, the WV firewall is only the first part of my test.
Thank you!
@WiseVector Excuse my ignorance but what is the difference between WMI firewall compared to the other wisevector firewall checkbox? What does it do?WiseVector StopX V3.05 was released!
Update log:
1. Added WMI firewall, which can prevent malware attacks (execution, persistence, exfiltration, etc.) by using WMI (Only supports Windows 8 and above).
WMI firewall is used to improve the detection of WMI based attack. Other firewall checkbox is working for the network protection. Here is the firewall level introduction.@WiseVector Excuse my ignorance but what is the difference between WMI firewall compared to the other wisevector firewall checkbox? What does it do?
Thanks much for quick response!WMI firewall is used to improve the detection of WMI based attack.
I have a question about WiseVector StopX 3.05 and why it won't update when using a VPN?WMI firewall is used to improve the detection of WMI based attack. Other firewall checkbox is working for the network protection. Here is the firewall level introduction.