

That is done like in most organizations under management direction and approval. Rather, they receive input from the Eset forum moderators and that input is selective at best and done to rectify existing "bugs" and operational issues in existing features.Įven if the developers were active participants, they do not initiate product revisions on their own. The developers do not actively participate in the forum. Of course, such protection can be circumvented by ransowmare that injects into trusted processes or by Office VBA macros.

if you allow writing to a particular folder for Office applications and block it for the other.

Such trivial protection similar to Controlled Access Folder can be achieved using HIPS rules, e.g. It's been already discussed here in the past. I guess it won't be hard to implemented this. ESET probably has the best and most customizable HIPS module of all the consumer AVs out there but it's missing this important feature at the moment. Many other AVs have implemented this with their Ransomware protection module. Like normal HIPS rules for files, user should be able to set whether ESET would ask the user for permission or always deny modification. I wanna protect my important folders from ransomwares or any other programs from modifying the contents of it. Snap! - Pluto, See-Through Wood, Fighting Scam Texting, PLATO, Counterportation Spiceworks Originalsįlashback: March 17, 1948: William Gibson, inventor of the term cyberspace, was born (Read more HERE.)īonus Flashback: March 17, 1958: Vanguard 1, oldest man-made object in Ear.Īnyone have suggestions on end user email security training, like Knowbe4 and InfosecIQ?ĭoes anyone use any tools for encrypting sensitive data that gets stored in onedrive?I have a tech \ privacy savvy CEO who has used boxcryptor for years to add an extra layer of protection for sensitive files he stores in onedrive, but Dropbox has purchas.Pardon me if this topic has already been discussed here or somewhere else on the forumĭescription: Protect folders using the HIPS moduleĭetails: Currently HIPS can protect specific files from modifications which I personally think is one of the coolest feature but the same can't be done for folders.This to bypass the rules that are in place. Students connecting school devices to their cell phone hot spots, and using

Over the past month, we have started to have trouble with Bypassing School Wi-Fi and Using Cell Phone Hot Spot Industry-Specific IT.
