I have never been a proponent of AV on servers because like others have
mentioned it causes way more problems than it fixes.  That said, can recent
AV detect ransomware encrypted files?  I would think not because it isn't
really an infected file per se, just encrypted.  But if it had logic to
determine huge amounts of file renames/changes to encrypted formats that
could definitely be very useful in stopping an infected workstation from
doing too much damage to its shared files.

2016-11-09 19:09 GMT-06:00 Michael B. Smith <[email protected]>:

> Yes, Windows Defender is part of Server 2016. Yes, you can (effectively)
> disable it (by creating a global exemption for all files and all processes
> and disabling real-time scanning).
>
> Can't speak to your Tivoli experience. Probably should complain on twitter
> for more attention.
>
> -----Original Message-----
> From: [email protected] [mailto:listsadmin@lists.
> myitforum.com] On Behalf Of Klaus Hartnegg
> Sent: Wednesday, November 9, 2016 4:35 PM
> To: [email protected]
> Subject: Re: [NTSysADM] Managed Anti-Malware for Servers
>
> Am 09.11.2016 um 07:29 schrieb Kish N Kepi:
> > I'm looking for recommendations for Anti-Malware software to install
> > specifically on Windows Servers (2008R2, 2012R2, 2016)
>
> NONE.
>
> On a normal workstation with dumb users one may hope that the pros
> outweight the cons, but how should they manage to do this on a server with
> only admin users, with no web surfing and no email?
>
> All anti-virus/malware products have pros an cons. One of the cons is that
> they create false positives, which sometimes break windows. You don't want
> this to happen on your servers. On all at once.
>
> Another con is that they (and their updaters) have serveral times been
> shown to be very buggy, they could be tricked into running arbitrary code
> with system rights. Consider how many different file formats such software
> must be able to interpret, and that code often can only be judged by
> letting parts of it actually run (in a sandbox, but still).
> Antivirus software is maybe the easiest way how an attacker can trick an
> otherwise secure server into running his code. Just by coping a crafted
> file to a shared directory.
>
> On most servers nobody should be surfing the web or reading emails.
> Except on terminal servers. And maybe except in Server 2016, if it acts
> like Win10, where many links in the UI trigger Edge, eventhough they do not
> look any different than the other options around them. Bad design.
> But if you disable Explorer and Edge, and do not install any other browser
> or email software, the server should be pretty safe. Probably safer without
> anti-something software, than with it.
>
> Btw does anybody know if Defender is part of Server 2016? If so can it be
> disabled?
>
> We just get lots of false positives from Defender in Win10. On my own PC
> such a false positive recently killed the backup process (Tivoli) several
> days in sequence, eventhough the affected file was already in the
> whitelist. The data on this machine machine would definitely have been
> safer without Defender than with it. Finally had to delete that file to
> make backup work again.
>
> How can it be that we have 2016, and there is still backup software
> around, that aborts when one file is blocked by antivirus software?
> Please somebody wake up IBM, and make them fix this.
>
>
>
>
>

Reply via email to