This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

ESET Updates blocked by IPS

Hi There,

SFOS 17.1.2 MR-2

 

Have been trying for the last few hours to allow my ESET Internet Security client to update but not getting anywhere even after creating rules to allow traffic to the "eset.com" domains and allow traffic to/from the Eset update servers to skip IPS, the only  way I managed to get it to work is by adding an allow packet for "1180501012 FILE-OTHER 7-Zip RAR CVE-2018-10115 Solid Compression Remote Code Execution"  to the "generalpolicy" IPS Policy however I'm not comfortable turning off one of the signatures for the whole network.

 

How can I simply allow communication with either "*.eset.com" or a list of IP addresses (IP Host > Creat a new a IP List with all Eset update server IP's) to skip IPS ?

 

Thanks



This thread was automatically locked due to age.
Parents
  • There are two ways to do it. 

    One simple and one "Complicated". 

    You can exclude the IPS pattern or create a new firewall rule. 

    New firewall is very easy. 

    https://community.sophos.com/kb/en-us/128173

    This KBA shows you, how to build the firewall rule. 

     

    IPS exception is more complicated. 

  • Thanks for the reply.

     

    I tried to create a firewall with an exception for the *.eset.com FQDN with no IPS but that did not help, the issue is the data being flagged on the return by IP address, so when I look at the IPS log is shows "

    Signatures
    Drop
     
    91.228.167.21
    192.168.X.X
    1180501012
    FILE-OTHER 7-Zip RAR CVE-2018-10115 Solid Compression Remote Code Execution
    Application and Software
    BSD,Linux,Mac,Other,Solaris,Unix,Windows
Reply
  • Thanks for the reply.

     

    I tried to create a firewall with an exception for the *.eset.com FQDN with no IPS but that did not help, the issue is the data being flagged on the return by IP address, so when I look at the IPS log is shows "

    Signatures
    Drop
     
    91.228.167.21
    192.168.X.X
    1180501012
    FILE-OTHER 7-Zip RAR CVE-2018-10115 Solid Compression Remote Code Execution
    Application and Software
    BSD,Linux,Mac,Other,Solaris,Unix,Windows
Children
No Data