If support didn't understand the request, they may not have provided the right direction. The best course of action was as suggested, but the request should have been for them to submit software for review, not necessarily how to make a better override. Also, my guess is more inline with the agent monitoring a process that is "unknown" and has nothing to do with the file types. So you're aware, our agent is not a "traditional scanning" engine, so traditional methods of "overriding" do not always apply. AutoCAD is something we have extensive knowledge about, but if you're still experiencing something unique, we may need to include additional rules to end/stop any monitoring. This is the most efficient method for more complex solutions. Customer - I would like to suggest you capture the "undetermined" report on one of the workstations in question and submit it to me personally and I'll have threat include it as part of our central data rules.Webroot® Legacy Products (2011 and Prior) 33.Webroot® SecureAnywhere™ - Antivirus for PC Gamers 552.Webroot® Security Awareness Training 38.Webroot® Business Endpoint Protection 1118.Webroot Mobile Security for Android 930.Webroot® Consumer/Business - for Macs 366.Webroot® SecureAnywhere™ - Complete 3811. Webroot® SecureAnywhere™ - Internet Security Plus 2463.Webroot® SecureAnywhere™ - Antivirus 6944.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |