atWORK
-
Posts
4 -
Joined
-
Last visited
Never
Posts posted by atWORK
-
-
Looks like the above version of kaspersky has some bug(s) in it. So far I had two devices where internet connection was getting blocked by self-defence. After updating to version 11.7.0.669 it got resolved.
-
Hello @atWORK,
Welcome!
- The Windows 10/11 cosmetic fix is yet to be released.
- It has nothing to do with Device status ❗ Critical
- Which Kaspersky software name, version & patch(x) x=letter, is installed → on the Windows Taskbar or hidden icons, rightclick the Kaspersky icon, select About?
- Is the software Premium, Trial, or Free?
- Has the software just been installed?
- Are there any similar errors in Kaspersky Reports?
Please let us know?
Thank you🙏
Flood🐳 +🐋
Hello,
- Which Kaspersky software name, version & patch(x) x=letter, is installed?

- It’s a cloud plus
- Yes it was installed about a week ago
- No I cannot find any similar error in the reports
-
Hi @o87 and all,
The issue is fixed, the fix will be released with the next version of the product, which is expected in early 2022.
There is nothing to worry with regards to this issue, it is only cosmetic and it does not influence the functionality of the product in any way.
Hi Igor,
Is this the reason a device would show critical for this specific topic? It’s also running windows 11 but shows windows 10



kaspersky on webserver
in Kaspersky Endpoint Security Cloud
Posted
Hi,
I know this might be a silly question but then why would our server go down when there is this network attack on our system? Is kaspersky blocking an attempt not sufficient enough than to take the whole web server down?.
We are running IIS as the application
Event 'Network attack detected' has occurred on device [DEVICE-NAME] in Windows domain [DOMAIN-NAME] on 2022-01-20T21:31:02
User: DOMAIN\Username (Active user)
Component: Network Threat Protection
Result description: Blocked
Name: UMIDS:Intrusion.Generic.CVE-2021-44228.a
Object: TCP from 192.168.X.X at 192.168.X.X:80 Object type: Network packet Object name: TCP from 192.168.X.X at 192.168.X.X:80
Additional: 192.168.X.X
Database release date: 2022/01/20 01:41:00 PM
NB: Endpoints in bold is the ip address of the server affected.