Skip to main content
Issue: Windows 2016 running as a virtual guest in VMware or Hyper-V with our Web Threat Shield driver enabled may experience a BSOD intermittently.

We have seen a very low level of occurrences and are offering this workaround whilst we continue to research and analyze the small number of cases seen and patch this issue.

 

Action: Webroot recommends that if you have servers running Windows 2016 as a virtual guest in VMware or Hyper-V, with our Web Threat Shield driver enabled, you should take action to deploy the workaround.

 

Workaround: Prevent Web Threat Shield URL driver from loading by: 


  • Using your GSM/EP Console to change the default (or current) policy used by your Servers, so that the Web Threat Shield policy rule > Enable Web filtering Driver = Off
 

If you do have any further questions or concerns, please contact the Webroot Support Team.
UPDATE

 

With the release of Web Threat Shield 1.6.0.13 this issue has been resolved. 

 

Updated: 


  • Improve detection of Install/Uninstall/update supported browsers.
  • Support for Puny code URLs.
  • Whitelisting now performed with certain Arabic characters.
Fixed: 


  • Fixed base64 encoding/decoding for Mozilla based browser extensions.
  • Whitelisting URLs with non-latin characters fixed for IE.
  • Disable/uninstall driver on WinServer 2016
  • Fixes for accessing IMVU.
If you do have any further questions or concerns, please contact the Webroot Support Team.

 

 

Reply