Jump to content

bourqud

Members
  • Content Count

    10
  • Joined

  • Last visited

About bourqud

  • Rank
    Candidate
  1. We had to reboot all our 32 bits workstations (it seem finally that it was related to 32 vs 64 bits clients, not to XP vs Win7 or rel 6 vs rel 8, another info not published) so they were able to finally download the new sig otherwise, they were all stuck at 81% download. As I have state to my rep (once I found out all the Canadian team had been terminated on Jan 4th), I can live with tech problem. I cannot and will not support a company that just forgot to tell it's customers about problem: - We have a problem and are working on it - our support line is overwelm and cannot answer to the calls - Publish timely updates - Publish the solution on all it's web sites and e-mail it's customer instead of waiting for a lucky customer that was able to reach support to publish by himself the solution. Wake up guys... We are on the fence right now and will have to dediced before year's end if we drop AV and move to whitelisting... Your actions (or lack of) is helping to reach the final answer...
  2. Reboot the stations. They will now be able to download the update. We have the same problem here
  3. Same stupid answer to the case I opened... No answer to the specific problem that as far as I can see affect all my XP stations. All those that tried to download the update before I cleared the repository and redownload from scratch (about 3 hours) are stuck in a download loop. Only solution so far is to reboot the stations. Thank you very much Kaspersky for the superb job you have done of NOT keeping informed your clients. I can live with a tech problem. I refuse to support a company that don't have the courage to admit the issue and do all it can to keep its client informed.
  4. Here it's 23:13 EST. On my refresh server Update Repository, it report Anti-spam: 21:20, Suspect URL: 20:40, Base Antivirus: 20:24, ProActive: 17:37, Base av for 6.0 MP4: 17:31 PS: The refresh download on my server is finished and I was able to manually update my station after a reboot to clear the looping (stuck???) download that have been running for the last 3 hours. Don't know if my other stations with the same problem will be able to auto update in the next 4 hours or if the end users will all have to reboot tomorrow morning. PS2: Not sure if it correct the port 80 blocking yet, we still have the Internet AV off in the policy. We will test in a test policy tomorrow. Right now, I am off to bed, suffering from heavy jetlag after my return trip from India yesterday night!
  5. Hours on the phone, waiting online, no answer, Chat just closed à 21:00 while I was in position 1 in the queue... I just fired an e-mail to all my contacts in Kaspersky Canada and USA. This is unacceptable We have disabled Internet av and HTTP access on port 80 have been restored but stations that start to download the latest update are stuck à 81%, downloading, downloading.... Just flushed the update repository, currently downloading fresh files on the admin kit server... Don't know what will have to be done on the stations currently in download loops... Anyone have seem this also?
  6. Did anybody tried to integrate Kas Sec center 9 with BIT9 product on Windows 7 workstation? I do not beleived that an Antivirus or whitelisting only solution can protect us but a combination of both, if it can work and don't kill the workstation could be a very good combo. I look rapidly at the whiteling possibility of the current Kaspersky client but it look to me as a really manually intensive function. Am I mistaken? What about the join announcement of KAS and BIT9 in 2008 about the integration of BIT9 functionnality in Kaspersky? Did any product come out of that? Thank you
  7. Voici ce qui a corrigé mon problème avec 2008R2 après bien des traces et des appels au support: ==== Attached is a regkey that will turn off MAC address verification in the Adminkit. Follow the instructions below: 1. Please add the attached registry key in computer with installed Kaspersky Administration Server (If the operation system is x64 you need to open x32 Regedit.exe residing here %windir%/SySWOW64) and Import this attached Registry Key. 2. After adding this registry key you must restart kaspersky Administration Server service. 3. After service restarting launch IP subnet scanning and check the result. REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\Components\34\1093\1.0.0.0\ServerFlags] "SrvNetScan_UseMAC"=dword:00000000
  8. Is autopatch F replace autopatch D or are both needed? New stations only show autopatch F. Is it normal? In the update report, I have entries with no patch level. Idea?
  9. Were you able to resolve the IP Scanning problem you reported with KAV on a windows 2008 server? We have the same issue
  10. Since this night scan started at 03:00AM local time, we are receiving hundreds of alarms about detection of Virus.Linux.Thebe.a. All seem to be related to Linux package or VMWare package. I tried to exclude this sig from the scan but the alert are not stopping. What can we do? AV Version: 6.00.3.387 Urgent update: c.d.e.f.i Sig: 2010-12-11 21:56:55 De : KasperskyAntivirus[sMTP:KASPERSKYANTIVIRUS] Date d'envoi : dimanche 12 décembre 2010 04:23:57 À : eTrust-AV Objet : Critique: Réparation impossible L'événement Réparation impossible s'est produit sur l'ordinateur Z500WXPG16999 dans le domaine LE500 à Sun Dec 12 03:32:46 2010 Le fichier D:\Server\qt4-devel-4.2.1-1.i386.rpm//./usr/lib/qt4/bin/qt3to4 n'a pas été réparé : l'enregistrement n'est pas pris en charge. à l'adresse IP: 10.8.64.80 De : KasperskyAntivirus[sMTP:KASPERSKYANTIVIRUS] Date d'envoi : dimanche 12 décembre 2010 04:23:55 À : eTrust-AV Objet : Critique: Découverte de virus, de vers, de chevaux de Troie et de programmes d'attaques L'événement Découverte de virus, de vers, de chevaux de Troie et de programmes d'attaques s'est produit sur l'ordinateur Z500WXPG16999 dans le domaine LE500 à Sun Dec 12 03:32:46 2010 Le fichier D:\Server\qt4-devel-4.2.1-1.i386.rpm//./usr/lib/qt4/bin/qt3to4, découvert : virus 'Virus.Linux.Thebe.a'. à l'adresse IP: 10.8.64.80 == L'événement Découverte de virus, de vers, de chevaux de Troie et de programmes d'attaques s'est produit sur l'ordinateur Z500WXPG15113 dans le domaine LE500 à Sun Dec 12 03:33:31 2010 Le fichier C:\Documents and Settings\stefani\Bureau\NBLU_6.5.4.UNIX_2of3_326450.zip/1241225241jtun_nb_6.5.4_linuxr.zip/VrtsNB_6.5.4.linuxR_x86.tar.Z//VrtsNB_6.5.4.linuxR_x86.tar//usr/openv/db/bin/dbadm, découvert : virus 'Virus.Linux.Thebe.a'. à l'adresse IP: 10.8.64.79 == L'événement Découverte de virus, de vers, de chevaux de Troie et de programmes d'attaques s'est produit sur l'ordinateur Z500WXPG17271 dans le domaine LE500 à Sun Dec 12 03:33:24 2010 Le fichier C:\Download\ubuntu-10.10-desktop-i386.iso//pool/main/f/fakeroot/fakeroot_1.14.4-1ubuntu1_i386.deb//data.tar.gz//data.tar//./usr/bin/faked-sysv, découvert : virus 'Virus.Linux.Thebe.a'. à l'adresse IP: 10.8.64.48
×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.