We have seen a very low level of occurrences and are offering this workaround whilst we continue to research and analyze the small number of cases seen and patch this issue.
Action: Webroot recommends that if you have servers running Windows 2016 as a virtual guest in VMware or Hyper-V, with our Web Threat Shield driver enabled, you should take action to deploy the workaround.
Workaround: Prevent Web Threat Shield URL driver from loading by:
- Using your GSM/EP Console to change the default (or current) policy used by your Servers, so that the Web Threat Shield policy rule > Enable Web filtering Driver = Off
If you do have any further questions or concerns, please contact the Webroot Support Team.