Hi,
I would suggest use:
https://secure.sophos.com/support/samples/
and choose "Application control request".
That's not detected on my machine either if I scan:
"C:\Program Files (x86)\Windows Live\Messenger"
I also have Windows 7 64-bit. I assume they are 2 different version of messenger on the 2 different platforms?
Regards,
Jak
Hey jak,
thank you for the reply.
thank you also for confirming that I am not the only one with this issue
I did earlier in the day submit a request to the sophos team to have this added.
I believe though that I might not have provided enough information.
I will have to be a little bit more specific as to what isn't being blocked.
Perhaps they will add this in their next release of applications
I think though your assumption is correct that these are different versions.
The thing that sort of threw me off though was that if you look at the executable, they are both named the same whether it be under Windows XP or Windows 7. I am not sure what the Application Control Service is using to identify what applications to block, but it must be more then just the exetuables name.
Sorry, and to answer your question this is as part of the Windows Live Essentials 2011 - With only Windows Live Messenger 2011 installed.
Cheers
Hi,
Yes it's more than the application names and is identity based from what I can tell. I had a look at SAV32CLI and with the power of strings.exe from Sysinternals manged to find the switch: -controlled
will scan the directory "C:\Program Files (x86)\Windows Media Player" for controlled applications.
In this case it reports:
>>> Virus 'AppC/WMPlay-Gen' found in file C:\Program Files (x86)\Windows Media Player\wmplayer.exe
Which tells me it's all using the same technology under the hood which is good as it should be thorough.
For the short term (hopefully before it gets added on a monthly release cycle), if you have AD, you can always set up a GPO software restriction policy to disable for example someone running a process name "msnmsgr.exe". If this is considered to open to file name classhes you could include the whole path: for example: "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe". Maybe this would work for you, even if it was only linked to a few OUs.
Jak
Hey,
I am going to play around with that command you showed.
It sounds like you are using some interesting tools to dig into this and I am definitely interested in
doing a little bit more digging myself (sysinternals has some pretty awesome tools).
Currently we do not use AD as our means to manage users so unfortunately pushing out a GPO quickly will not be possible.
This is part of the reason why I would like to start using the Application Control Policy.
It isn't a huge deal right now as we have dealt with the few instances of messenger that we have found running, but it would be nice to get this application blocked to prevent future issues.
I have a case number with Sophos for my Application Request, am I able to submit additional information towards this ticket reference number?
Thank you,
Cheers
The identity has now been updated. Here's the details from the lab:
"Update to detect Windows Live Messenger 2011" as part of "Windows Live
Essentials 2011", filename msnmsgr.exe,product version 15.4.3508.1109
is going out in the next alert. However, please note, that installer is
not included as it is an installer for a number of applications that
come under "Windows Live Essentials 2011",
Regards,
John
Product Manager
Hey Johnstringer,
Thank you for the update that is awesome!
I understand that it is only designed to detect Live Messenger and not the installer - that is great!
Thanks for the hard work.
Just out of curious (this will sound stupid). But is there anyway that I can confirm that my Server has received this update?
Thank you,
Cheers