Microsoft AntiSpyware Beta1.

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

Hello:
This question is for the "Security Experts": For how much longer will
AntiSpyware continue to be a Beta version??
Thanks,
 
The Beta was refreshed a few days ago to 1.0.701. This was done
to extend the expiration date until the end of July 2006. While no
firm delivery date is known, you can probably expect a Beta 2 to
be released early next year before any finalized release happens.
 
Fwall4 said:
Hello:
This question is for the "Security Experts": For how much longer will
AntiSpyware continue to be a Beta version??
Thanks,

Even though MS may one day, sometime in the distant future, take the
Beta tag off of MSAS, like ALL MS software, it will always be an
incomplete, work-in-progress, bug-riddled piece of code.

--
Peace!
Kurt
Self-anointed Moderator
microscum.pubic.windowsexp.gonorrhea
http://microscum.com/mscommunity
"Trustworthy Computing" is only another example of an Oxymoron!
"Produkt-Aktivierung macht frei"
 
Fwall4 said:
Hello:
This question is for the "Security Experts": For how much longer will
AntiSpyware continue to be a Beta version??


Until Microsoft decides that it's good enough to be a released version
instead. No date has been announced.
 
=?Utf-8?B?RndhbGw0?= said:
This question is for the "Security Experts": For how much longer will
AntiSpyware continue to be a Beta version??

Send a message to the Author of the BETA program in question.
 
Until Microsoft decides that it's good enough to be a released version
instead. No date has been announced

I thought their plans has changed about the Antispyware,
they want to combine a Firewall, Antispyware, and Antivirus
in one program.
 
Ted said:
I thought their plans has changed about the Antispyware,
they want to combine a Firewall, Antispyware, and Antivirus
in one program.


What - are you saying that SP2's Windows Firewall isn't upto the job?
 
Hi, McCarty and all others who commented on my question:
I know of the 1.0.701 version, it automatically downloaded last night. So
you say there could be a BETA2 and maybe 3, 4, 5.... will it ever end? Like
Ken said: "until MS decides it's good enough to be resleased"... which
according to kurttrail may never happen. And, Plato, if I knew who the
author(s) of this is (are) I would like to pose the same question to him
(them) or her (I want to be politically correct and not leave out the
feminine aspect... lol). In the meantime I'll just enjoy the freebie.
Wishing you all a happy Holiday Season,
 
only can block incomming traffic.

Just perfect, I am glad its not messing with my local network.
I was glad MS came out with their Firewall, because Zonealarm was
pain for local networking.
 
But the fact remains it is not a full firewall, only can block incomming
traffic.

Steve


What else do you want. I prefer to control what is coming in NOT (I
repeat NOT) what is going out.
 
ANONYMOUS said:
:





What else do you want.

Independent wealth, for starters.
I prefer to control what is coming in NOT (I
repeat NOT) what is going out.

Ok for you, I prefer to have the ability to review and control ALL (I
repeat ALL) traffic on my network, in or out.

Steve N.
 
Well then good for you. Have you thought of digging a hole, filling it
up and digging up again, filling it up and so on. This way you can keep
yourself very busy forever!
 
Ted said:
Just perfect, I am glad its not messing with my local network.

Oh trust me, that lame M$ firewall has wreacked havoc on my local and
wide area networks. I'm a network admin for a very LARGE WAN and
nothing, NOTHING, has been more of a PITA than M$'s lame-ass default SP2
firewall crap. I've got scores of people that can't even browse network
shares they have full rights to without disabling that piece of crap
with convoluted registry entries to turn that stinking b@stard off at
startup and keep it off! Don't talk to me about how "perfect" that
sh!tstain is. M$ should leave firewalling to the experts.
I was glad MS came out with their Firewall, because Zonealarm was
pain for local networking.

That's because you apparently don't know what a REAL firewall is nor how
to configure one. It takes knowledge, intelligence, research, and
attention to detail that you apparently lack. If ZA didn't work for you
then it's most likely your own shortcommings to blame.

Steve N.
 
Oh trust me, that lame M$ firewall has wreacked havoc on my local and wide
area networks.

Me too, but is it the firewall or XP is the problem ?
I thought it was windows problem.
I had to allow shares on the whole drive so it will
allow access. It will not accept share access.
 
ANONYMOUS said:
Well then good for you.

Yes, it is very good for me.
Have you thought of digging a hole, filling it
up and digging up again, filling it up and so on. This way you can keep
yourself very busy forever!

Thanks anyway for the nice thought, but I'm plenty busy enough as it is
with very rewarding real life challenges.

Have you ever thought of saying something meaningful or enlightening?
No? Maybe you should be digging that meaningless hole you speak of for
yourself.

I stated my opinion, based on my direct experiencial observations. Don't
like it? Then I suggest you crawl in that hole, lay down and ask someone
to fill it in. Either that or simply ignore me or just STFU unless you
have something valuable to contribute to the discussion. I couldn't care
less WTF you think until you offer something that might be akin to
valuable and usable knowledge or information for me or others. Until
then you're JAAWIA (Just Another A$$hole With Internet Access).

Cheers :)

Steve N.
 
Ted said:
Me too, but is it the firewall or XP is the problem ?

It's the SP2 firewall, alright. With SP2 the firewall blocks damn near
everything at startup except DHCP, DNS and communication with a Domain
Controller for policies. Then later (when it's too late anyway, in most
cases) your custom settings _might_ take effect (if you're lucky). You
have to disable it in the registry so it doesn't block almost everything
at startup (when you really _need_ it to be unblocked in many cases). M$
calls it "boot-time policy"; from:

http://msdn.microsoft.com/security/productinfo/XPSP2/networkprotection/firewall.aspx

" In Windows XP Service Pack 2, the firewall driver has a static rule,
called the boot-time policy. It performs stateful filtering and
eliminates the window of vulnerability while the computer is booting.
This new policy rule allows the computer to open ports so that basic
networking tasks such as DNS and DHCP may take place. It also allows
communication with a domain controller to obtain appropriate policies.
Once the firewall service is running, it loads and applies the run-time
Windows Firewall policy and removes the boot-time filters. (The
boot-time policy cannot be configured.)

There is no boot-time security if Windows Firewall/Internet Connection
Sharing (ICS) is set to Disabled. "

That last two sentences are lies. "Boot-time policy" _can_ be configured
and even _disabled_ in the registry, and furthermore it still imposes
"boot time security" even whe WF/ICS is set to disabled through the
recommended methods by M$, without disabling it directly the registry.
Without specific registry entries concerning the boot-time policy you
have no control over it, i.e. you have to nip it in the bud, so to speak.

Here is an example of a .reg file we have had to import into all our XP
SP2 machines on a Novell network to enable them to login to Netware
without incident and browse mapped Netware drives (and allow ZfD Remote
Management to connect, but that's another matter), and I suppose that
Windows shares would be affected similarly, but you'll get the idea...

REGEDIT4

; WinXP SP2 Firewall Changes for Novell

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirewallOverride"=dword:00000001
"FirewallDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\StandardProfile]

"EnableFirewall"=dword:00000000

[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile]

"EnableFirewall"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]
"Start"=dword:00000003

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]

"524:TCP"="524:TCP:*:Enabled:Novell NCP - TCP"
"524:UDP"="524:UDP:*:Enabled:Novell NCP - UDP"
"123:UDP"="123:UDP:*:Enabled:Novell NTP - UDP"
"427:TCP"="427:TCP:*:Enabled:Novell SLP - TCP"
"427:UDP"="427:UDP:*:Enabled:Novell SLP - UDP"

For your particular problems you will have to research the port, name
and protocols for yourself. I apologize, but we are primalily a Netware
house here and have no Windows Servers with mapped shares.

I can only hope this will help lead you to research the issue as it may
apply to your particular situation and is only presented as an example
of how the SP2 Firewall _really_ works (or doesn't, depending on your
point of view).
I thought it was windows problem.

Oh, it _is_, it is a a Windows XP SP2 problem!
I had to allow shares on the whole drive so it will
allow access. It will not accept share access.

Figures. Sucks. Sorry I don't have a more direct solution for you.

Cheers and hopefully happy computing! Live and learn, eh?

And Happy Holidays!

Steve N.
 
That last two sentences are lies. "Boot-time policy" _can_ be configured
and even _disabled_ in the registry,

Typical of MS.

That is why I wouldn't use the Antispyware. Even of you deselect
the option not to monitor and not to start on startup, it still starts
on Startups, unless you remove the key from the registry.
And after four months, it pops to tell you that it has expired.
I call MS Antispyware Bigfoot.
For your particular problems you will have to research the port, name and
protocols for yourself. I apologize, but we are primalily a Netware house
here and have no Windows Servers with mapped shares.

Thank you very much, I completely disabled the firewall, and
shared the drives. But still once in a while I get access denied or
blocked.
I will look into your suggestion.




Steve N. said:
Ted said:
Me too, but is it the firewall or XP is the problem ?

It's the SP2 firewall, alright. With SP2 the firewall blocks damn near
everything at startup except DHCP, DNS and communication with a Domain
Controller for policies. Then later (when it's too late anyway, in most
cases) your custom settings _might_ take effect (if you're lucky). You
have to disable it in the registry so it doesn't block almost everything
at startup (when you really _need_ it to be unblocked in many cases). M$
calls it "boot-time policy"; from:

http://msdn.microsoft.com/security/productinfo/XPSP2/networkprotection/firewall.aspx

" In Windows XP Service Pack 2, the firewall driver has a static rule,
called the boot-time policy. It performs stateful filtering and eliminates
the window of vulnerability while the computer is booting. This new policy
rule allows the computer to open ports so that basic networking tasks such
as DNS and DHCP may take place. It also allows communication with a domain
controller to obtain appropriate policies. Once the firewall service is
running, it loads and applies the run-time Windows Firewall policy and
removes the boot-time filters. (The boot-time policy cannot be
configured.)

There is no boot-time security if Windows Firewall/Internet Connection
Sharing (ICS) is set to Disabled. "

That last two sentences are lies. "Boot-time policy" _can_ be configured
and even _disabled_ in the registry, and furthermore it still imposes
"boot time security" even whe WF/ICS is set to disabled through the
recommended methods by M$, without disabling it directly the registry.
Without specific registry entries concerning the boot-time policy you have
no control over it, i.e. you have to nip it in the bud, so to speak.

Here is an example of a .reg file we have had to import into all our XP
SP2 machines on a Novell network to enable them to login to Netware
without incident and browse mapped Netware drives (and allow ZfD Remote
Management to connect, but that's another matter), and I suppose that
Windows shares would be affected similarly, but you'll get the idea...

REGEDIT4

; WinXP SP2 Firewall Changes for Novell

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirewallOverride"=dword:00000001
"FirewallDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\StandardProfile]
"EnableFirewall"=dword:00000000

[HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\WindowsFirewall\DomainProfile]
"EnableFirewall"=dword:00000000

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]
"Start"=dword:00000003

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"524:TCP"="524:TCP:*:Enabled:Novell NCP - TCP"
"524:UDP"="524:UDP:*:Enabled:Novell NCP - UDP"
"123:UDP"="123:UDP:*:Enabled:Novell NTP - UDP"
"427:TCP"="427:TCP:*:Enabled:Novell SLP - TCP"
"427:UDP"="427:UDP:*:Enabled:Novell SLP - UDP"

For your particular problems you will have to research the port, name and
protocols for yourself. I apologize, but we are primalily a Netware house
here and have no Windows Servers with mapped shares.

I can only hope this will help lead you to research the issue as it may
apply to your particular situation and is only presented as an example of
how the SP2 Firewall _really_ works (or doesn't, depending on your point
of view).
I thought it was windows problem.

Oh, it _is_, it is a a Windows XP SP2 problem!
I had to allow shares on the whole drive so it will
allow access. It will not accept share access.

Figures. Sucks. Sorry I don't have a more direct solution for you.

Cheers and hopefully happy computing! Live and learn, eh?

And Happy Holidays!

Steve N.
 
Ken Blake said:
Until Microsoft decides that it's good enough to be a released version
instead. No date has been announced.

Seriously, what's not good enough about it right now that it should stay in
Beta? Seems like a very solid and capable app as it is now.
 
Back
Top