Skip to content

Antivirus

They are usually fraught with false-positives because we live in a world of complex greys, not black and white.

We are facing significant challenges due to the stringent policies of antivirus companies. Antivirus software is a critical tool for safeguarding Windows systems against viruses, trojans, and other malicious threats. However, the aggressive approach of some antivirus companies towards virus and trojan protection often results in legitimate software, such as Tactical RMM, being misclassified as malware.

For instance, Tactical RMM is designed to assist IT professionals and system administrators in managing and monitoring systems remotely. This, while essential for operational efficiency and security, can sometimes be flagged by antivirus solutions as potential threats. This classification occurs despite the primary use of Tactical RMM for legitimate, constructive purposes. The rationale behind such decisions is that if a tool could potentially be leveraged for malicious activities, it must be treated as a threat. This stance overlooks the reality that the majority of users employ these tools for valid and positive reasons.

Some antivirus companies adopt a slightly more nuanced approach by labeling these tools as "Security Threats" or "Riskware." While this is a less severe classification than labeling them as viruses or trojans, it still hinders users by quarantining or deleting the tools, effectively preventing their use. Moreover, the distinction between "Virus" and "Riskware" is lost on many users, leading to confusion and undue concern and why do they not class other RMMs the same?

The issue of overzealous protection is not unique to Tactical RMM. Other developers, both small and large, encounter similar problems with antivirus software flagging their products without clear justification. Examples include utilities that do not even involve password recovery or system monitoring but still face unwarranted scrutiny and restriction. Infact we can see NirSoft 15 years ago wrote a similar blog about this.

The challenge extends beyond individual developers to affect the broader ecosystem. Small developers, in particular, struggle with the ramifications of these false positives, lacking the resources and legal clout that larger companies possess to quickly address and resolve these issues.

To mitigate these challenges, it is crucial for both users and developers to engage more proactively with antivirus companies. This involves reporting false positives, providing feedback on software classifications, and advocating for a more balanced approach that recognizes the legitimate use of Tactical RMM. Ultimately, greater awareness and communication can help ensure that essential tools are not unjustly penalized, supporting a more secure and efficient digital environment. Remember YOU are the antivirus companies customer, YOU by reporting these false positives can help!

At the moment, Microsoft Windows Defender thinks a go executable with virtually nothing in it is the "Trojan:Win32/Wacatac.B!ml" virus https://old.reddit.com/r/golang/comments/s1bh01/goexecutables_and_windows_defender/.

Be aware there is also a PowerShell script to add TRMM exclusions specific to Windows Defender.

Note

If you need to use 3rd party AV, add the necessary exclusions (see below for examples) and submit the exes as safe.

Bitdefender Gravityzone

Admin URL: https://cloud.gravityzone.bitdefender.com/

To exclude the Tactical and MeshCentral agents, go to Policies > {policy name} > Antimalware > Settings > Custom Exclusions.

Antimalware Settings

Add the following exclusions. The ATS/IDS module does not support file exclusions, only folder exclusions.

File Excluded Items Modules Notes
Folder C:\ProgramData\TacticalRMM\ On-demand, On-Access, ATC/IDS All TRMM scripts are saved here to run
Folder %ProgramFiles%\Mesh Agent\ On-demand, On-Access, ATC/IDS Excludes Mesh Agent from ATC/IDS
Folder %ProgramFiles%\TacticalAgent\ On-demand, On-Access, ATC/IDS Excludes TacticalAgent from ATC/IDS
Process %ProgramFiles%\Mesh Agent\MeshAgent.exe On-Access, ATC/IDS Excludes Mesh Agent service (process) from ATC/IDS
Process %ProgramFiles%\TacticalAgent\tacticalrmm.exe On-Access, ATC/IDS Excludes tacticalrmm service (process) from ATC/IDS
File %ProgramFiles%\Mesh Agent\MeshAgent.exe On-demand, On-Access This may not be needed since the entire folder is excluded
File %ProgramFiles%\TacticalAgent\tacticalrmm.exe On-demand, On-Access This may not be needed since the entire folder is excluded

Antimalware Exclusions

To exclude URLs: Policies > {policy name} > Network Protection > Content Control > Settings > Exclusions

Web Exclusions

Web Exclusions

Webroot

Admin URL:

Web Exclusions

Web Exclusions

Web Exclusions

Web Exclusions

Sophos

Sophos Central Admin

Go To Global Settings > General > Global Exclusions > Add Exclusion

Agent Exclusions

Agent Exclusions

Agent Exclusions

Agent Exclusions

Agent Exclusions

Sophos XG Firewall

Agent Exclusions

Log into Sophos Central Admin:

Admin URL: https://cloud.sophos.com/

Log into the Sophos XG Firewall.

Go To System > Hosts and services > FQDN Host Group and create a new group.

FW Exclusions

Go To System > Hosts and services > FQDN Host.

Create the following 3 hosts and add each to your FQDN host group.

  • api.yourdomain.com
  • mesh.yourdomain.com
  • rmm.yourdomain.com (Optional if you want your client to have GUI access to Tactical RMM)

FW Exclusions

FW Exclusions

Go To Hosts and services > Services and create the following services:

  • Name: Tactical-Service-443
    • Protocol: TCP
    • Source port: 1:65535
    • Destination port: 443

FW Exclusions

FW Exclusions

Go To Hosts and services > Service group and create the following service group:

FW Exclusions

Go To Protect > Rules and policies and add a firewall rule:

  • Rule name: Tactical Rule
  • Rule position: Top
  • Source zones: LAN
  • Source networks: ANY
  • Destination zones: WAN
  • Destination networks: Your FQDN Host Group
  • Services: Tactical Services

FW Exclusions

FW Exclusions

Optionally select Log Firewall Traffic checkbox for troubleshooting.

ESET PROTECT Console

There are three areas where you need to configure exclusions:

  1. Detection Engine > Performance Exclusions Web Exclusions Web Exclusions

  2. Web Access Protection > URL Address Management > List of addresses excluded from content scan Web Exclusions Web Exclusions Web Exclusions

  3. Web Access Protection > URL Address Management > List of allowed addresses Web Exclusions Web Exclusions

UTM Filter Bypasses

Use the below if your UTM blocks installation of Tactical RMM

^https?://([A-Za-z0-9.-]*\.)?tacticalrmm\.com\.?/