Skip to main content
Solved

localservicenonetworkfirewall


Forum|alt.badge.img+1

Is this process safe?  I’m running Windows 10.  I’m having no issues but I’ve seen posts that this could be malicious, and I’ve seen posts that it is perfectly safe.  Does this process indicate an infection or that Widows Defender is shut down?

Best answer by TripleHelix

Hello @Thtomrob 

 

I have it listed in Task Manager and I see no issues with it.

 

Click on picture to see full size:

 

 

If you want a free security check contact Webroot Support!

 

Webroot Support:

Submit a ticket

Call 1-866-612-4227

Note: When submitting a Support Ticket, Please wait for a response from Support. Putting in another Support Ticket on this problem before Support responses will put your first Support Ticket at the end of the queue.

 

Thanks,

View original
Did this help you find an answer to your question?

2 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 9222 replies
  • Answer
  • August 28, 2021

Hello @Thtomrob 

 

I have it listed in Task Manager and I see no issues with it.

 

Click on picture to see full size:

 

 

If you want a free security check contact Webroot Support!

 

Webroot Support:

Submit a ticket

Call 1-866-612-4227

Note: When submitting a Support Ticket, Please wait for a response from Support. Putting in another Support Ticket on this problem before Support responses will put your first Support Ticket at the end of the queue.

 

Thanks,


TylerM
Administrator
Forum|alt.badge.img+25
  • Sr. Security Analyst & Community Manager
  • 1277 replies
  • August 28, 2021
Thtomrob wrote:

Is this process safe?  I’m running Windows 10.  I’m having no issues but I’ve seen posts that this could be malicious, and I’ve seen posts that it is perfectly safe.  

Yeah that’s the arena of googling processes,. and it’s a big hot mess for reliability as even known good processes like explorer.exe or powershell.exe can be injected and used for malicious actions. Really you want to be looking at MD5 (What WSA uses) or another signature like SHA-256 to identify individual files.

 


Reply