WuTang LAN
Regular Contributor
Is there a way to test if TrendMicro is actually fully disabled (i.e not calling home) once it's been turned off in the WebUI?
I'm still leaving it shut off.
Is there a way to test if TrendMicro is actually fully disabled (i.e not calling home) once it's been turned off in the WebUI?
TrendMicro disabled means no adaptive QoS, correct?
I can't find any new info on the topic of the Trend Micro "hack". Have you guys disabled your AI Protection? What's the general advise in case that Skynet & Diversion are used?
Thanks in advance for your opinion!
Here’s the wrap up from Trend Micro’s investigation. If they really are being transparent then this is good news:
https://www.cbronline.com/news/fxmsp-trend-micro
That is good news.
AiProtection is enabled again.
Yeah. I don't think it did their reputation any good. (Did they have a reputation?)Seems to be not as big of a deal, AdvIntel seemed to sensationalize the situation.
iptables -A OUTPUT -o eth0 -p tcp -m state --state NEW -m multiport ! --dports 53,123,853 -j logaccept
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 57 <WAN-IP>:37483 150.70.183.141:443 ESTABLISHED 1082/dcd
Jun 28 09:45:26 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.140 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=47414 DF PROTO=TCP SPT=35552 DPT=443
Jun 28 09:45:39 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.140 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=1104 DF PROTO=TCP SPT=35553 DPT=443
Jun 28 09:45:44 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.141 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=7373 DF PROTO=TCP SPT=33830 DPT=443
Jun 28 10:15:27 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.140 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=65366 DF PROTO=TCP SPT=55233 DPT=443
Jun 28 10:15:28 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.141 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=16438 DF PROTO=TCP SPT=36328 DPT=443
Jun 28 10:45:24 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.141 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=35684 DF PROTO=TCP SPT=37483 DPT=443
Jun 28 10:45:26 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.140 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=64589 DF PROTO=TCP SPT=39128 DPT=443
Jun 28 11:15:27 kernel: ACCEPT IN= OUT=eth0 SRC=<WAN-IP> DST=150.70.183.141 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=44642 DF PROTO=TCP SPT=40013 DPT=443
With AiProtection disabled, dcd keeps triggering the HTTPS request every 30 minutes, but to be fair, I haven't "been allowed" to reboot the router to see how it behaves when AiProtection is disabled at boot time.
Sure, that will be my last step. I'm first wondering if the outbound connections only relate to AiProtection or if A.QoS will still require those connections.Try rejecting the Trend Micro EULA on the Privacy tab.
Keep in mind the Trend Micro engine isn't just used for AiProtection, it's also used for other features such as Adaptive QoS, Web History, Parental Control, etc...
Withdrawing consent certainly ends all the outbound traffic since all the relevant processes (wred, dcd) are no longer running.Try rejecting the Trend Micro EULA on the Privacy tab.
Keep in mind the Trend Micro engine isn't just used for AiProtection, it's also used for other features such as Adaptive QoS, Web History, Parental Control, etc...
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!