Skip to main content

NOTICE: Endpoint Driver Issue with Virtualized Windows 2016 Servers

  • December 7, 2017
  • 1 reply
  • 35 views

  • Retired Webrooter
Issue: Windows 2016 running as a virtual guest in VMware or Hyper-V with our Web Threat Shield driver enabled may experience a BSOD intermittently.
We have seen a very low level of occurrences and are offering this workaround whilst we continue to research and analyze the small number of cases seen and patch this issue.
 
Action: Webroot recommends that if you have servers running Windows 2016 as a virtual guest in VMware or Hyper-V, with our Web Threat Shield driver enabled, you should take action to deploy the workaround.
 
Workaround: Prevent Web Threat Shield URL driver from loading by: 
  • Using your GSM/EP Console to change the default (or current) policy used by your Servers, so that the Web Threat Shield policy rule > Enable Web filtering Driver = Off
 
If you do have any further questions or concerns, please contact the Webroot Support Team.

1 reply

Forum|alt.badge.img+48
  • Retired Webrooter
  • March 7, 2018
UPDATE
 
With the release of Web Threat Shield 1.6.0.13 this issue has been resolved. 
 
Updated: 
  • Improve detection of Install/Uninstall/update supported browsers.
  • Support for Puny code URLs.
  • Whitelisting now performed with certain Arabic characters.
Fixed: 
  • Fixed base64 encoding/decoding for Mozilla based browser extensions.
  • Whitelisting URLs with non-latin characters fixed for IE.
  • Disable/uninstall driver on WinServer 2016
  • Fixes for accessing IMVU.
If you do have any further questions or concerns, please contact the Webroot Support Team.