![]() ![]() Is there an issue on M2 Macs?ĬlamXAV have told us that they are still investigating this but, so far, have had no reports of it occurring on M2 systems. We’ve continued working closely with Apple on the issue, and they’ve identified a potential solution, but they have not shared with us a timeline for releasing it.ĬlamXAV put out a message in November of last year stating that updating your OS to 12.0.1 “may help”, but later retracted this in favour of a new workaround. The company also stated that this was only affecting a small minority of customers. We would like to reassure customers that we are in close contact with Apple for the purposes of diagnosing and fixing this issue. We believe that this can only be an issue with Apple’s code and not our own, as we don’t ship any code that runs at the kernel level. What did ClamXAV say about this?Īt the time, the company issued the following statement to The Big Tech Question: However, Sentry is used to scan files in real-time – with this deactivated, you are relying on timed scans or performing them ad-hoc. It was found that turning off ClamXAV’s “Sentry” scanning resolved the problem. They can be identified by the screen going pink, followed by a sudden shut down and restart. This is what’s known as a “kernel panic”. Users running ClamXAV on M1 Macs were seeing occasional reboots, each of which reported an error similar to this: panic(cpu 4 caller 0xfffffe00184dd618): "uipc_send connected but no connection?" ![]() So what can you do now to prevent a ClamXAV crash on an M1 Mac? Find out below. A year on and things have changed, although the root cause is still to be fixed. ![]() At the time the cause wasn’t known, but there was a temporary workaround. If you haven't noticed AV in general would qualify for my own segment of "You know what really grinds my gears.Last year I reported that Macs running the new M1 chipset were crashing when running ClamXAV antivirus. No one ever got fired for installing (antivirus|firewall) Not saying that everyone should uninstall it from all of their machines (oh how I pine for that glorious day) but going back to the Metasploit versions released in late 08 it is now incredibly trivial to create an executable with signatures that nothing has seen before. "Beware Windows antivirus snake oil peddlers." "Whilst the engineers at Apple sat on their hineys for two months and let up to 700,000 Apple customers get hurt." Always willing to stick it to Apple for doing something stupid. I like this post that went up today and RIXSTEP in general. And you have BIG A/V solution digging through all your email then how would that happen? If the Windows machines are already doing on-access scanning. Not an Apple OS.) One that came to mind was Sophos', but I don't know if their Mac product is anything but the free home one I've seen (can't seem to find anything but that and their FDE for Mac solutions on their site). I'm open to other solutions, as long as they can run on Enterprise infrastructure (i.e. Does anyone currently manage it with Casper? What are your experiences, good/bad/indifferent? If Apple would let the server OS be virtualized in something like an Enterprise-level VMWare, this would be moot. With Apple out of the Enterprise game, I'm not comfortable with a Mac Mini or Mac Pro in the datacenter, nor would our datacenter guys go for it. I've given VirusBarrier a look and while I appreciate that it's Mac-centric, it's a bit *too* Mac-centric as it requires Mac OS X on the backend. Thankfully, I have the latitude to choose the solution that meets our needs. (We're piggy backing for now on their service.) We currently use McAfee Security for Mac, but it's resource heavy and it's serviced by another department. I'm interested in seeing what people use for their AV solutions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |