Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 06/28/2010 in Posts

  1. 3 points
    Hello all, We are happy to announce a new release of Immunet: Version 7.0.0! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes Credo and AMSI. Credo is a ML engine that allows endpoint connector to extract feature print of a PE file and send to the cloud to see whether the file is malware or not. ScriptID engine allows AMP connector to analyze scripts prior to execution. It is based on the Windows Antimalware Scan Interface (AMSI). In 7.0.0 version of connector only PowerShell scripts are analyzed. You can get the new installer here. https://download.immunet.com/binaries/immunet/bin/ImmunetSetup.exe If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from http://www.immunet.com/index Changes in 7.0.0 Improvements and updates: New Credo engine New ScriptID engine for AMSI Query improvements in Immunet Protect driver Improvement in preforming Immunet registration Improvements in Connectivity test tool Curl version update ImmunetSCMS service now handle crash reporting Driver updates to support No Reboot upgrades New certificate for the ELAM driver Improvements on the Malicious Activity Protection (MAP) to reduce false positive Fixes: Stability Improvements in the Immunet Protect driver Stability Improvements in the SPP Stability Improvement on Immunet Protect shutdown Stability Improvements in the Exploit prevention
  2. 3 points
    Hello all, We are happy to announce a new release of Immunet: Version 6.3.0! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes Improved detection coverage Windows 10 RedStone 6 support Update ClamAV to version 0.101.2 Improved status in Windows Security Center Bug fix to exploit prevention engine Immunet installer now handles all legal windows characters that can be in a Windows file path for default install Fixes to mitigate high CPU/Memory issue some users are seeing on Windows 10 during Windows updates. As always, you can get the new installer at https://www.immunet.com. We strongly recommend existing Immunet user to upgrade to v6.3.0 and start taking advantage of new improvements. If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from https://www.immunet.com If you do encounter problems with the new version of Immunet Protect, please let us know via forums at http://support.immunet.com Thank you for your continued support! The Immunet Protect Team
  3. 2 points
    Hello all, We are happy to announce a new release of Immunet: Version 7.0.2! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes NoReboot upgrade beta. The Immunet Windows Connector often requires a reboot to complete the upgrade. This can be problematic for end users who have to time reboots, if they are in middle of critical updates or working on some important project, in order to upgrade the Connector, raising barriers to upgrading more regularly. This feature is to remove the requirement for reboots when upgrading the Windows Connector for good. Expected upgrade behaviour for Immunet users: * Upgrades from Connector versions < 7.0.0 to 7.0.0+ require a reboot to complete * Upgrades from Connector versions 7.0.0+ to any higher version do not require a reboot to complete Looking forward for your participation and help in cases of upgrade reboot failures issues, if encountered any. We would appreciate if you can reach out to us via support forum with Support logs as soon as you see upgrade failing or upgrade asking for reboot on upgrade. You can get the new installer here. https://download.immunet.com/binaries/immunet/bin/ImmunetSetup.exe If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI we recommend uninstalling Immunet and reinstalling the version downloaded from http://www.immunet.com/index Changes in 7.0.2 Improvements and updates: No Reboot upgrades No Reboot uninstalls New kernel logs for Connector upgrades and uninstalls Installer improvements to handle NoReboot upgrades and uninstall Fixes: Stability Improvements in the Immunet SelfProtect driver Fixed reference leak in asynchronous kernel exclusions Stability Improvements on Immunet Protect driver
  4. 2 points
    Hi all, The newest 6.3.0.10988 build of Immunet has a new running process called cscm. Microsoft made some improvements as to how antivirus solutions can better protect their software from unauthorized intrusion. It's a fact that some malware has the capacity to disable the installed AV, usually through unauthorized code-injection methods. This added security protocol will make it much harder for malware to disable Immunet. For anyone that wants to read this Windows Dev Center article (thanks Wookiee) regarding this added security protocol click on this link. https://docs.microsoft.com/en-us/windows/desktop/services/protecting-anti-malware-services- Regards, Ritchie...
  5. 2 points
    Yup, this is the right place for your questions. Sorry, Immunet doesn't offer spam or phishing protection, Interestingly , older versions of Immunet could scan local Outlook.pst email databases for malicious email attachments, but we shelved this feature for a couple reasons: 1) the average user moved to cloud email services (gmail, Hotmail, outlook.com / etc), most of which provide absolutely minimal span and phishing protection, making local emal scanning redundant 2) Microsoft changed their outlook.pst format and libraries a couple times resulting in Immunet failing to quarantine just the attachment from within the outlook.pst database file; and instead quarantined the entire email database.
  6. 2 points
    Ritchie, As soon and you mentioned AMP I fully remembered that I selected YES on both of those systems. I uninstalled Immunet and selected NO, rebooted and all is good now!! I agree that I will stay with AMP, but this is a GREAT free product for home users. Grant
  7. 2 points
    I've sent it to Clam so guess we'll see what they say. Thanks for your help!
  8. 2 points
    I would venture to guess that the ClamAV module is scanning files at the same time as they're being created by Visual Studio. Try creating a custom Immunet Exclusion rule for Visual Studio's entire Program Files folder in Settings. Then turn ClamAV back on, restart your computer and see if the same behavior persists. You can also directly contact the ClamAV developers to inform them of this issue if you wish. https://www.clamav.net/contact Best wishes, Ritchie...
  9. 2 points
    Try a restart of your PC and also press several times the update button!
  10. 2 points
    I am running Windows 7 Pro on an older desk top and during the last few days have been getting a Virus detected and quarantined message on virtually every application that I use. I have been using some of these sights for 10 plus years and never had this issue previously. It persists even when I switch from Firefox to Chrome. I just ran a full scan of the entire computer and get reports of no virus found and have verified that the latest update is installed (as of 2/2/19). When I go to manually initialize Immunet, I see a note that the computer has never been scanned and is not secure even when I have just run a full scan. A typical warning is that f_0001f3 has been detected as Clam.Txt.Trojan.Generic-6840302-0. Quarantine was successful. I even got a message that Firefox Installer was a Trojan. This is very annoying and I would like some suggestions to resolve this issue. Nelson
  11. 2 points
    confirmed, is defiantly a Clam false positive. Thanks to everyone who reported this. we're reprod it internally and are working on a fix. In the mean time, if you turn off the clam AV engine in Immunet's settings that'll prevent the constant FP notifications and still keep your computer protected with the immunet cloud engine. We'll notify the thread to turn clam back on as soon as the fp is fixed.
  12. 2 points
    Why not brother.. You can download Avast offline installer from here and Know how to uninstall avast step by step here.. The step by step guide also has a link to the avast removal tool
  13. 2 points
    Hello everyone, I see a lot of future in this software, its interface is destined to "the end", compared to other interfaces today ... But instead of just talking, I made a new design for Immunet AntiVirus .. .I only did the basic part, in case I get you back, I can go back to work on the interface and finish for a new look to the software. Here are the images: I look forward to the feedback from the developers, and also from the community. Att: Lucas Lks
  14. 1 point
    Thank You Ritchie!
  15. 1 point
    It was the first PC I built so details are a little fuzzy, but whatever the typical setup is. So surely connected to the MB via SATA. C drive is a SSD (Immunet is installed here) D drive is a regular HD
  16. 1 point
    You nailed it, it's not working on my D drive. Files on my C drive Context Menu Scan just fine. Since I have a workaround I can't be arsed to reinstall, if that turns out to be the only solution.
  17. 1 point
    RanSim is a tool that simulates the behavior of ransomware. The purpose of RanSim is to check if a workstation is well-protected with endpoint security software which would be able to detect and prevent real ransomware attacks. It also allows you to see if this software is incorrectly blocking files by running "false positive" scenarios. You can optionally select specific files you'd like to test to see how they would be affected by the ransomware simulations. ............................................maybe similar to cisco/talos amp,network protection
  18. 1 point
    The Department of Homeland Security issued a rare public warning urging on-line shoppers to use a great deal of vigilance this holiday season! Black Friday's on-line sales was at a record high of about 4.1 billion dollars spent, I'm sure the bad guys have taken notice of this, and Cyber Monday is right around the corner too. Cyber crime always increases during the holiday season but there has been an "alarmingly noticeable increase" of reported incidents compared to last year. Here are some things you can do to protect yourself from becoming a victim of cyber crime. First of all it's not a bad idea to update your Antivirus software & run a malware scan of your Operating System drive before doing any holiday shopping. Then make sure your AV is kept up to date while doing your on-line shopping. If you have access to a Virtual Private Network (VPN) definitely use it whenever you do any on-line banking or shopping regardless of the time of year. When holiday shopping on-line make sure you don't end up on a bogus site that resembles the real thing. Fake websites are on the rise this year. Apple, Amazon, and Target are currently the most impersonated. Other big names in the same situation are Tiffany, Sony, Samsung, and Microsoft. Always look for the secure "HTTPS" URL header with the shopping site's Domain name. Almost all legitimate on-line retailers use these secure encryption protocols that protects your personal data that's being sent from your browser. Also look for Domain names for popular brands that have spelling errors or mistakes, even if using the HTTPS protocols or not (HTTP) these are not genuine. Consider using a major credit card for payment such as Visa or MasterCard, etc... instead of a bank debit card. If using a debit card your savings or checking account could be drained and, unless the criminals are actually caught, there's nothing much can be done about that. Most major credit card company's offer some form of reimbursement if it's discovered that you were a victim of scamming. Plus the big card company's have methods to detect & react to possible fraudulent use of your card number. Still check your card's account often for any unauthorized purchases and contact the card issuer right away if you suspect something is amiss. Another option would be to use PayPal or a similar secure web based payment service if the retailer accepts these types of payment methods. Email is also being used for phishing attempts, malware using attachments as an attack vector or to re-direct you to a malicious drive-by download site. Avoid opening any links or attachments that come from any unsolicited entity. Especially if it comes from a company or charity you never heard of or never done business with. Be very wary of so-called free giveaways, discounts or gift cards delivered to your in-box this holiday season. When in doubt, just delete them. Social media sites are also being targeted with possible malicious/phishing links offering such holiday themed giveaways, gift cards or discounts. So be wary of any links you click on while visiting social media sites as well. A little common sense can go a long way to keep you safe too. "If you see a bargain that seems too good to be true it probably is!" Best wishes, Ritchie...
  19. 1 point
    +1 for Richie's answer.
  20. 1 point
    Hey ritchie58... What I meant by (error 0) is that what was reported in that little Immunet Updater windows instead of (error 503). Not that there were no more errors and I should have been more detailed than that. Sorry. However, today all I see is "Immunet is Up to Date." No (error anything ) ! Server side issue resolved it seems. I'll keep any eye on it. Later!
  21. 1 point
    Hello Damokles and thank you for your interest in Immunet, Not sure what you mean by making a complete list. Immunet originally was strictly just a cloud based AV when it was first introduced. The draw back to that was Immunet had to have a constant internet connection for cloud based lookups during normal operation & during a scan. Also there was no off-line scanning capabilities. After the introduction of the open-sourced signature based ClamAV into the program that not only added an additional layer of off-line protection but also added the ability to run scans even if no internet connection is present as it works as a traditional downloaded malware definition signature based AV. You can use just the scalable multi-threaded ClamAV scripting code http://www.clamav.net/ as an automatic or on-demand AV scanner & a email gateway scanner for instance. ClamAV does not have a UI in the traditional sense since everything is handled through Command Line scripts. Of course Immunet provides a traditional UI to users without the need for advanced technical skills to configure or use since ClamAV's scripts are integrated into Immunet's program code via the ClamAV module. Immunet can be used as a "stand-alone" AV solution. If used in this manner it is recommended that the ClamAV module & updates for it be enabled. If Immunet is used as a companion AV to a compatible paid product it is recommended that the ClamAV module remain disabled. This improves the amount of system resources being used. Immunet will work with Defender. Using them both should provide good malware protection for the average user. In fact Immunet has, by default, an exclusion for Defender for improved compatibility. If using Immunet with Defender I would consider "not disabling" the ClamAV module for the reasons described below. Adding an exclusion/exception rule to Defender for Immunet's Program Files folder is also very highly recommended. That way they recognize each other as safe programs and goes a long way in avoiding possible future conflicts. If I "had to choose" one or the other I would definitely go with Immunet over Defender. Microsoft even admits that Defender is meant for users that don't have or don't want to use a different AV solution. Although some improvements have been made with newer builds Defender still is not a stellar anti-malware program as it provides basic protection. The Plus version of Immunet is no longer available. Immunet Protect Free is just like the name implies, it's totally free for individual/home or private network use and for "non-profit" charitable or educational organizations! Immunet is not licensed for any "for profit" business, service, organization or product. If it's found that Immunet is being used in such a manner no support will be offered. This information is included in the End User License Agreement (EULA) when first installing Immunet. We recommend that any for-profit entities use Immunet's paid Enterprise version called AMP for Endpoints. https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/datasheet-c78-733181.html I hope this answers your questions. Regards, Ritchie...
  22. 1 point
    Thank you, let me make one more example.
  23. 1 point
    Will be nice can protect the program with password so cannot be edited or deactivated by other PC users.
  24. 1 point
    To include the ability to lock the UI with a password is not a bad idea in my view! If the computer is used by multiple people (especially if kids are present) in the household that could prove to be beneficial. Actually Immunet's enterprise version called Amp for Endpoints uses an on-line console instead of a traditional UI. This ensures that no unauthorized personal can make any changes unless one knows the user name & password to the console.
  25. 1 point
    Hi Ritchie, I will look into providing a list of important fixes that are included in the release. To answer some of your other questions: The Credo engine is a new engine that is integrated within the product. The ScriptID engine will monitor PowerShell activity and doesn't require a new process to function. Cheers, Andrew
  26. 1 point
    @Rob.Turner I can confirm that I can either see text or get a download prompt for every one of those links supplied. @ritchie58 Don't worry, I of course still allow Windows updates on my internet-connected machine. I have Pro so am fortunately able to defer any non-security updates for up to a year, which I recommend everyone should do before their PC gets bricked. It gives Microsoft a good chance at fixing the worst of their problems before their "improvements" reach your machine - unless the next broken update they release without testing just happens to be a security one... As a side note, When your Windows 7 reaches end-of-life, one option would be to just have a dual-boot scenario: Switch to GNU/Linux for anything that requires the internet, and keep your unsupported Win7 installation as-is, unpatched, for any obscure software you might still need to run occasionally, but can't get on GNU/Linux. You'd just need to keep the Windows 7 installation offline, for instance by disabling your network interfaces in the device-manager, or unplugging your network cables. I'm aware there's a learning-curve, it's a matter of personal taste, and It's not possible for everyone, but I'm about 90% of the way there. I used to dual-boot and value both OSs for their respective qualities, but I'm rapidly getting to the point where I just need to get the work done and Windows now gets in the way of that for me.
  27. 1 point
    If you look at the list most of the exclusions have to do with Windows Update. If Immunet was scanning these files while Windows was updating if could take much longer to download & install the updates. These exclusions are also there to keep Immunet from using up excessive system resources. Once any new code is installed these files will be scanned when you run your next full scan. Keep in mind that Immunet also has heuristic capabilities that can recognize suspicious activity. Except for Defender all the third-party AV exclusions can be manually deleted.
  28. 1 point
    Sorry for the delay in responding & thanks for the added info. What it sounds like to me is that your copy of Immunet has some corrupted .db files if it's not remembering the previous settings configuration. I would suggest you try and do a clean uninstall. First uninstall Immunet, when asked by the uninstaller if you plan to reinstall Immunet again choose the "NO" option, this will delete all .db history files. Then reinstall Immunet but you will have to reconfigure the Settings and add any custom Exclusions you were using again. Let us know if this corrects the issue. I was given a free one year license for AMP a while back just to check it out myself so I am familiar with the software. It can be configured for home/personal use too. Having to use an on-line console to effect changes instead of a traditional UI did take a bit of getting use to I remember. This is a security feature since no unauthorized personal can make any changes to the software without the proper log in credentials to the console. Although not free like Immunet, AMP for Endpoints really is the better choice if you're using a multiple endpoint server environment for the simple fact that you can customize this software to your specific needs. Also with AMP you have the option of using the TETRA detection engine (which was part of the no longer available Immunet Plus). Originally based on Bitdefender's detection engine this now highly customized engine can sniff out usually hard to detect malware like root-kits, keyloggers, encrypted Trojan downloaders, etc... One more nice thing with AMP (compared to Immunet) is that you can configure it to automatically scan all in-coming email data packets for malware. A still prevalent attack vector. Compared to AMP, Immunet doesn't have no way near the customization options. I would suggest you stick with using AMP for Endpoints at least with your server! Something else I should mention is that Immunet is not licensed to be used in any "for profit" business, service, product or organization. If it's discovered Immunet is being used in this manner no further support will be offered. This info is included in the End User License Agreement (EULA) when you first install Immunet. Best wishes, Ritchie...
  29. 1 point
    Cool, thanks for taking the time to report this to the ClamAV team! Much appreciated Macbeth!
  30. 1 point
    Hi Bitsomper, I'm sure you've read the previous threads to this topic so the devs are definitely aware of the situation. Unfortunately the newest 6.3.0.10988 build did not address this known issue. Thanks for adding this thread! Maybe the devs will see this issue is still causing problems for users and "eventually" do something about it. Immunet really needs to incorporate a way to upscale the UI for 4k screens! That is a obviously needed upgrade, that seems to be continually overlooked, that should be implemented with some new code in some future build. The sooner the better in my opinion.
  31. 1 point
    Instead of downloading an online installer, try the same with the offline installer. You can download it here. Also, ClamAV detects a lot of false positives, so no need to worry.
  32. 1 point
    Problem solved. I used Immunet installer (found in the \Temp folder) in a Windows 10 virtual machine, then I monitored the uninstaller process handlers while I used Revo Uninstaller. Then I erased (on my real, affected PC) all of the files the Uninstaller modified/erased (Cleanup agent included) and that Revo had to erase too (I used a Linux LiveCD as some files/registry entries were blocked). It looks like Immunet uses Cisco's AMP, (Self Protect, Policy files...) and all of those files are kind of hidden and well protected. After all that was done, Immunet installed correctly. If someone's having this problem, please don't do as I did, as this process is very, very risky and Windows will most certainly get damaged. Just disable your antivirus before installing KB4503293 update. It seems like this problem could happen with any antivirus, but Immunet has no Removal Tool and so the only fix is to reinstall (a system restore point won't do the trick) Windows. Anyway, this is a really unique problem so I don't think someone will ever run into this issue where Windows removes Immunet files (and uninstallers). Still, Cisco should offer a Removal Tool to avoid these situations. Thanks for all the help you've given to me, ritchie58.
  33. 1 point
    First of all for those that do not know what a VPN is here is a brief explanation of what it does. A VPN, or Virtual Private Network, allows you to create a secure connection using encryption protocols to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from hackers on public Wi-Fi, and much more. These days VPNs are "really" popular, but not for the reasons they were originally created. They originally were just a way to connect business networks together using encryption protocols over the internet or allow you to securely access a business network from home. VPNs essentially forward all your network traffic to an encrypted network, which is where the benefits, like accessing local network resources remotely and bypassing Internet censorship, come from. Why would I need a VPN service? Thanks to the Trump administration Congress passed legislation in Dec. of 2017 that allows your Internet Service Provider (ISP) to share or sell your browser history to third-party entities. Also, a VPN makes on-line shopping, banking or any site where sensitive data is required to be submitted much more secure since all internet activity is encrypted within the VPN service. I know that including a VPN service would be a costly endeavor since new code would have to be written and infrastructure changes would have to be enacted. For this reason I propose that a new Plus (paid) version be created to include an encrypted, entirely secure VPN service. Just an idea. Cheers, Ritchie...
  34. 1 point
    It's a hell wonderful idea! I promise I will share this great news when new Immunet will be in use with all my friends and tell them what to do to be secure and safe. You are really cool, guys! Are you going to create several VPN servers or only one?
  35. 1 point
    Thank you for the Information @ritchie58.
  36. 1 point
    Thank you Richie a VPN in Immunet is a great suggestion, and thanks Cyrille for the +1 and being willing to pay for it. I've escalated the suggestion and can only wait and see what comes of it.
  37. 1 point
    You can try to upload the two files on Virustotal and check the results from different AVs https://www.virustotal.com/#/home/upload
  38. 1 point
    Thank you very much for reporting this Jon. I've successfully reproduced it, and at this point my only advice is to steer clear of win 10 1809. as far as I can MS pulled it after release due to driver incompatibilities and potentially deleting user data when upgrading from previous versions. I was able to obtain a 1809 iso through MSDN and it ended up bootlooping during install of both home& pro win 10 versions (installing to vmware workstation). I had to use a workaround just to complete the OS install: https://luyentap.blogspot.com/2017/10/windows-installation-cannot-proceed.html. After that I was able to install Immunet and repro your bug.
  39. 1 point
    Six months later and we're still on the Windows 7 era GUI
  40. 1 point
    I'm receiving the same message when loading Gmail in firefox flagging a cache file as "Txt.Trojan.Generic-6840302-0". I also have a number of anti-spam anti tracking and security plugins installed. It's possible one of them is doing something Immunet doesn't like. ABP, Ghostery, uBlock Origin, https everywhere, canvas defender, privacy badger, firefox multi-account containers and lastpass. I uploaded the cache sample to virus total. The ClamAV engine was the only one to flag this as a trojan. The content is a compressed GZ stream with the following code: this.A2A=this.A2A||{};(function(_){var window=this; try{ var aa,ba,ca,da,ea,fa,ha,ia,ja,ka,la,ma,na,ua,va,wa,xa,ya,za,Ba,Da,Ea,Ia,p,Ja,Ka,Na,Oa,Pa,Qa,Ra,Sa,Ta,Va,Wa,eb,fb,gb,hb,ib,jb,kb,mb,lb,nb,ob,pb,q,t,v,qb,rb,sb,tb,ub,vb,wb,yb,zb,Cb,Ab,Bb,Db,Eb,Fb,x,z;aa=function(a){for(var b=a.length;0<=--b;)a=0};ba=function(a,b,c,d,e){this.te=a;this.Jf=b;this.If=c;this.Ff=d;this.lg=e;this.Nd=a&&a.length};ca=function(a,b){this.zd=a;this.xb=0;this.Wa=b};da=function(a,b){a.T[a.B++]=b&255;a.T[a.B++]=b>>>8&2 Source: https://www.virustotal.com/en/file/6570a85c33d467f10e52bddc31575c4329ca1a6ae9641c4321690a8ae65e41c5/analysis/1549184011/ I've submitted it to clamAV as a false positive.
  41. 1 point
    Richie is correct - the internet connection icon is a standard windows thing. the Bing image search told your browser to show an image from neilrosenthl.com and your browser went to grab it from 104.27.175.64. According to https://dnslytics.com/ip/104.27.175.64 that ip is hosting 290 domains/websites. likely one of them at one point was hosting something malicious. Though currently neilrosental.com appears to be safe. Looks like a false positive to me. Sorry, our bad on that one. I do have one concern here though. It's common to first notice the internet connection icon after having a random router/modem reboot. I The internet stops working, so you go to your network connections to check your ip/network status and while your poking around the internet connection icon appears out of nowhere when the router/modem comes back online. There are lots of good reasons for a router to reboot itself, but it should be noted that not all vpn connections can survive a router reboot. Some can, some will notify you the vpn closed unexpectedly, and some will just fail silently and your internet activity will automatically re-route over non encrypted public internet. Thanks, RobT
  42. 1 point
    The bios bug Wookiee mentions is usually found with brand name manufactured computers, ie Dell / EMachines/etc. and otherwise we have seen installation issues where users have special characters characters in their Windows user names. e.g ' " , <> ]!@$%^&*()_ Any chance either of those apply?
  43. 1 point
    Hello again. 64 bit protection in 6.2.4?? Thanks!
  44. 1 point
    Hi Rich, I'm sorry to say that Windows Server 2019 is not a supported platform at this time however Win 10 is supported. Immunet does have an "enterprise version" that I believe will work with Windows Server 2019 called AMP for Endpoints (AMP is an acronym for Advanced Malware Protection). It's not free but the price is reasonable and actually negotiable depending on the length of your license that you choose and the number of endpoints to be protected. Plus you get much better malware/intrusion protection compared to Immunet in a server environment. So take a look to see it AMP for Endpoints better meets your needs. https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/index.html Cheers, Ritchie...
  45. 1 point
    Okay.. Thank you so much for your help Rekhathakur..
  46. 1 point
    Thanks for some guidence Rekha,, Can you also provide me the links to these tools please ?
  47. 1 point
    Hello all, We are happy to announce a new release of Immunet: Version 6.2.0! This latest version of Immunet provides the same great protection against malware and viruses as before, but also includes Malicious Activity Protection (MAP) engine for detecting ransomware, System process protection detection notifications, Connector UI improvement, Performance improvements, Support for Windows Server 2016 and other bug fixes. As always, you can get the new installer at https://www.immunet.com. We strongly recommend existing Immunet user to upgrade to v6.2.0 and start taking advantage of new features and improvements. If you are running an older version of Immunet, you should be able to upgrade via the 'Update Now' button in the UI. If you don't see the update in your UI, you can always download the latest installer from https://www.immunet.com and execute it to get the upgrade. If you do encounter problems with the new version of Immunet Protect, please let us know via forums at http://support.immunet.com Thank you for your continued support! The Immunet Protect Team
  48. 1 point
  49. 1 point
    Ritchie, Thank you for responding so promptly! I'm satisfied with your response as it seems to be a well-established one to these types of questions in the forum. As a huge fan of you and your teams' work, I will continue to hope that this type of functionality lands itself onto your roadmap somehow. Thanks again for taking the time this weekend. I hope you have a wonderful coming week! Respectfully, Nadmin
  50. 1 point
    Hi Valnat, Immunet & Amp for Endpoints do share the ETHOS, SPERO and the ClamAV engines & sigs. AMP also has the TETRA module that was only available to the Plus (paid) version of Immunet when it was still being supported. TETRA has the ability to detect threats that other AV engines may have trouble with. For instance, encrypted rootkits to name just one. I hope that answered your question. Regards, Ritchie...
×
×
  • Create New...