I have a HA cluster in which a trial threat prevention license was activated on active firewall only. Thus on the HA widget i have mismatch on anti virus version. Since it is already expired, in order to bring the firewalls back in sync, I wonder if its safe to delete via CLI the currently installed Anti virus update with the command "delete anti-virus update [file]".

I would recommend to delete expired license first. Here is the KB , then delete the actual antivirus content package either from GUI under: Device > Dynamic Updates or through CLI as you suggested. This should resolve the issue.


Dr Web Anti-virus Free Download


Download File 🔥 https://urllio.com/2yGb4x 🔥



Waking up this old topic because I am also thinking of this. Coming from the windows world and always being a bit paranoid with digital security, the mental need for an anti virus being active in the system is high. I have been fine with linux not needing anti virus for the past decade, as there are less threats out there and the uptime of my linux systems has been really low.

One drawback to ClamAV was that updates to rules lagged behind new viruses by several weeks. Users learned to delay opening emails from unknown sources for a week or two to give time for the rules to catch up.

There are many tools available for free for linux, with clamav and comodo antivirus among them.

With any tool that is FOSS you are able to actually look at and modify the code if you wish and feel you may be able to improve performance.

As always in all operating systems, the first line of defense is a user who is security conscious, does not click on random suspicious links, does not allow emails to lead them astray, etc.

Downloading from known reliable sites only and in general being smart are the best front line protection.

I used to be required to run anti-virus on linux at work where clamav was configured to scan local storage periodically. Signature based tests of file contents is pretty much a losing proposition though. There is work to improve the situation.

Decting and Grouping Malware Using Section Hashes

However, you can also go the other way, but strengthening you Linux setup. There are options to make Firewall, SELinux or the whole system (e.g. running the whole system in FIPS mode) much more strict and secure.

The Federal Information Processing Standards (FIPS) of the United States are a set of publicly announced standards that the National Institute of Standards and Technology (NIST) has developed for use in computer systems of non-military United States government agencies and contractors. FIPS standards establish requirements for ensuring computer security and interoperability, and are intended for cases in which suitable industry standards do not already exist. Many FIPS specifications are mo The U...

It is good to know that the Firewall and SELinux rules are created and managed by the package maintainers. And we are still learning, enhancing them. There, for sure, will be a lot of space in the current SELinux rule set, through which an attacker slip. But even then the SELinux is a priceless tool.

TL;DR:

The Linux have much better base level of security than Windows.

The native ways of strengthening your security on Linux are not anti-viruses, but other tools (not breaching security by yourself for the sake of easy-to-use, running SELinux and Firewall in strict modes; running the system in FIPS, isolation of untrusted code).

@monttukani, becoming educated on what the choices for security and privacy provide is not easy. The defaults in the fedora ecosystem has the benefit of having lots of successful use and thus, from my vantage point, a good amount of validity.

I enjoy learning more about firewalls, selinux, seccomp, cgroups, namespaces and any other facility that can be employed to increase security and privacy. I highly recommend trying to use your system with higher, more restrictive security configured and then find resolutions to problems rather than reverting to the less secure configuration.

Antiviruses follow a flawed approach that can never create a system with a reasonable security/efford ratio. They use something called badness enumeration, which can be explained like this:

Now what happens if someone develops malware D? It will only end up in a malware list if it was already used, with some delay and incomplete. I dont think antivirus companies share their lists, which is very bad and increases this efford.

SELinux and AppArmor, as well as Flatpak and others do the opposite, they only permit certain actions. This may break software, but you adapt the rules to what you know the software needs to do, and unless a release publicly announces a new functionality this should not change, so you are set.

Still, SELinux is disabled for the user and the desktop, which means everything in your home is unprotected, which makes SELinux on Desktops basically useless. Any tool can modify your .bashrc and catch your sudo password, or see all your personal files which you dont store in a system location.

SELinux confined users on the other hand also solve the same problem and work for way more programs than Flatpak does, but afaik they are not well compatible with Flatpak and they currently break Desktops and more.

Still I think using ClamAV to scan files you download, like st**id Appimages or random binaries, is really important. As proprietary software and bad packaging formats get even more established on Linux (Tuta, Warp, Balena Etcher and whatnot have Appimages) this is more and more needed.

I know this is not directly related to Merkai however I'm hoping some users can provide some recommendations to the following.


We are about to deploy Systems Manager to all our devices and was seeing what people use for anti- virus and anti- malware for their devices on Systems manager (Windows & MacOS). I would love to be able to use Systems manager to push these apps out to the devices and register the license etc. via either some sort of package or script. I currently don't have a anti-virus/malware vendor so willing to pick one that works better with Systems manager.

I quite like Trend Worry-Free Remote Services (the "services" bit mean it is the cloud based version). I prefer all my technology like this to be cloud managed. The same platform does both Windows and Mac.

I'm on my 3rd day of the Trend Micro Worry Free trial. So far so good with our test system; however, we had to manually install it. I was not able to push it out via the Meraki Applications push. 

Furthermore, the link provided in the email to install it would not work in MacOS Chrome. We had to do it from Safari (weird I thought).


@Stoffe did you run into anything similar? How did you push this to your users?

Aaah! gotcha. We have very few win machines. The macOS versions vary.... our devs work on 10.12.1 - 10.13.4 (I know, this makes it a little harder to narrow down). I thought at first it was related to the test machine having 10.13.4 with the new KEXT enforcement, but we've eliminated that as the culprit.

Well~ our Trial has come and gone. Although I liked the dashboard interface and their support was responsive when we needed them, Trend Micro's Worry Free Business Security Services is not the ideal solution for a mac shop. We were unable to remote install TMWF without end-user interaction, and the uninstall from dashboard does not work. Systems with macOS require a manual uninstall (found in the tools section). Most concerning was the fact that we were unable to create directory exclusions with wildcards. Most of our users use some kind of mounted cloud directory file share, the scan would attempt to include the entire directory... and due to the lack of wildcard usage, we were unable to use the targeted scan options to only include certain directories (which would require a wildcard in lieu of each username). Most of their documentation and advanced scripting/support is geared for Windows environments. Overall, it was very limited functionality. 

We know this is not TrendMicro's only offering, so we will be reaching out to sales and consulting on whether they offer something different for our needs. 

We are also trying out Sophos (which so far seems more robust for macs although it has the same limitation for user interaction for install). I'll gladly return and post what I find.

Hey Phil! We've crossed each other in the IT nether!!!

I was just on a demo with a couple of the CrowdStrike folks just yesterday afternoon Their product is nothing short of amazing. But truthfully, although it was SUUUPER cool and the insight it offered was mind-blowing, it was also overkill for what we need... I think we're still going to trial it in the interest of being thorough (And because I'm dying to play with their features). 

Please do follow up and let me know what you decide at the end. We're still on the Sophos trial ourselves. And considering ESET next. Feels like I've been researching and testing this stuff for ages

Update: Meraki Systems Manager is unable to deploy the software with out user interaction. Although Apple have provided a way to allow this with MDM Meraki does not have this feature enabled and recommend I place a Make a wish in the dashboard.


Honestly I think this is ridiculous as Crowd Strike installs fine on Mac OS Sierra, its only High Sierra that has the problem. More and more people are going to have this issue when trying to install certain apps on their Mac unless Meraki provide this feature. I have raised a wish please give it Kudos to get the ball rolling on this one.




 edit: I see that you ran into that thread. I do agree that this shouldn't have to be a "thing". It's taking a bit of time for developers to catch up to these added securities at the kernel level. I will kudos your post for sure. 152ee80cbc

australian immigration

download free video pixel

vray glass material free download