Jump to content

kasfan

Members
  • Content Count

    40
  • Joined

  • Last visited

About kasfan

  • Rank
    Candidate
  1. Well actually it is: 1. Right click the icon 2. Click disable policy 3. Type password 4. Right click Icon 5. Click Pause protection and control 6. Type password 7. Make selection 8. Click Resume protection and control 9. Click enable policy 10. Type password So, for one simple operation you have to enter the password 3(!) times.. This causes many problems: Being forced to to enter the password 3 times increases the chances that some nosy user would be able to discover the password while the administrator types it. "Save password for the current session" is not an option for me because this will enable the user to disable the protection whenever he wants until he reboots. If you accidentally enable the policy before enabling the protection, you will have to disable the policy again in order to be able to resume the protection... HELP!
  2. I simply don't get the logic behind this new 'feature' What was wrong with how it worked until now?? Can someone PLEASE explain me?
  3. Hello, I am trying to define a Application Startup Control policy that will deny everyone access to the web browser except some users I specify. I specify for example my user as the allowed users list I specify 'everyone' as the blocked users list. Then I to launch firefox and i get blocked even though I'm on the allowed list Please help /me
  4. Hello, We're in the middle of of migrating from v6 MP4 / AdminKit 8 to Endpoint Security 8 / Security Center 9 While that process, I came across a few annoying bugs/"features": 1. "Pause protection and control.." is grayed out - to be able to pause protection you have to disable policy first When you disable the policy, you get a password prompt... After that "Pause protection" turns on and you are able to press on it. When you press on "Pause protection", you get password prompt again.. If you enable policy after disable it, you get password prompt again If you enable policy before resuming protection, you will not be able to resume it because it is grayed out again 2. Disable policy menu item will not show, and so you will not be able to disable protection at all, if either: a. enable password protection is checked out. b. enable password protection is checked and "selected operations" is checked instead of "all operations". 3. On the email notification settings, I cannot specify specify blank password (I don't want to AUTH to the SMTP server because it uses clear text) If I press "Test" with blank password it works and I get the test email but I cannot press the OK button because it says "missing password" I am using the latest versions: KSC 9.2.69 KES 8.1.0.831 Administration plug-in ( 8.1.0.831) Please help /me
  5. I think deleting the files that belongs to this remote computer from the backup/quarantine repositories of the Admin Kit would do the trick.
  6. @Maher Waheeb: these are all false positive. @SysKeeper: I did not do a rollback, I update the trusted zone via Administration kit policy to exclude "I Exploit.MSWord.CVE-2010-3333.a".
  7. Hello, Since this morning I'm getting this message for EVERY word file attached in our exchange server: "RichBody: detected Trojan program 'Exploit.MSWord.CVE-2010-3333.a'." I've go hundreds of events like this and still going.... help!!!
  8. 3 months it took to get and answer from official KL, still no solution yet BTW, I hope this fix will fix the "Process is trying to redirect data input/output. Probably it is attempt of remote access to your computer (RootShell)" problem too and not just the outlook bug... I think this is much serous bug and it gives a alot of a headache when KAV decides to randomly quarantine EXE files
  9. Why no kaspersky labs representative give us official answer about patch D problems (the outlook crash and input/output redirect false positive) ????????
×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.