Get answers and solutions, initiate discussions, and connect with experts globally
Hello. Would it be possible to add a Linux installer for computers to the installation agent download?
Hi WithSecure, one best method to detect any malicious actor in one network is the capacity to deploy decoy hosts and servers, and monitor for unauthorized access. After detect unauthorized access the EDR can be execute automatic playbook.
Hi WithSecure, identify active communications as malicious sites to protect against malware distribution, phishing, and known C2C based communication should be a best method to detect and anticipate intrusions or attacks (example deploy ransonware).
Hello WithSecure All EDR security products have the Remote Shell action to respond to incidents, why WithSecure don't include this basic option? In commercial line most proposal is ignored because our WithSecure EDR can't have the most used response actions.
Hi Team, I would like to request a feature: Currently, Elements Browsing Protection's content filtering for file types (e.g., blocking ".exe" downloads) only works over HTTP. This feature request is to extend Elements Browsing Protection to inspect and block file downloads over HTTPS, with the ability to create granular…
Good Day. Currently there is no way to exclude certain processes from connection control. You can allow URL's but not processes from being excluded from connection control blocking network connections of unknown applications. Certain industries spend a lot of time on financial/banking sites and not being able to exclude…
This changelog provides updates for WithSecure™ Elements Endpoint Security, previously known as Endpoint Detection and Response (EDR). It includes the latest improvements, feature enhancements, and fixes related to endpoint protection, detection, and response capabilities. These updates help organizations strengthen their…
Hi, As of now, the 'Analysis'-tab for BCD alerts is quite lack-luster. The idea behind the existing functionality is quite good actually, but not when it comes to using and reading it, it could be a lot better and more human friendly. It's just a long text line. It's not even a text box, since everything gets truncated…
We are using WithSecure, and after updates of certain third-party applications, our clients frequently receive a system prompt indicating that a restart is required (see attached example). Currently, users can only choose between restarting immediately or postponing the restart without specifying a timeframe. This often…
It would be massively helpful to see all installation events including failed attempts in the "Installation Logs". That way one could easily determine the causes of failed attempts instead of relying on screenshots of the logs.
It looks like you're new here. Sign in or register to get started.