Sometimes, the SuperOps agent gets incorrectly detected as malicious software and is automatically uninstalled by some antivirus software. While we are currently working on resolving this issue, here's how you can whitelist the SuperOps agent in your antivirus and ensure it continues to function properly:
ESET PROTECT
1. Edit policy settings
Go to Policies > Edit Policy > Settings > Potentially Unsafe Applications
Set Reporting to Aggressive and Protection to OFF.
This change will ensure that the SuperOps agent doesn't get uninstalled if ESET detects it as unsafe.
2. Create an exclusion
Select a detection and click Create Exclusion.
In Settings, under Exclusion criteria, select Detection (Exclude each detection)
Under Auto-resolving, check the Resolve matching alerts checkbox to automatically resolve the alerts covered by the exclusion.
For detailed instructions on whitelisting SuperOps in ESET, check out this article.
Windows Defender
Go to Start > Settings > Update & Security > Windows Security > Virus & threat protection.
Under Virus & threat protection settings, select Manage settings, and then under Exclusions, select Add or remove exclusions.
Select Add an exclusion, and then select from files, folders, file types, or process. A folder exclusion will apply to all subfolders within the folder as well.
Finally, clear cached detections and obtain the latest malware definitions with the instructions below:
Open command prompt as administrator and change directory to c:\Program Files\Windows Defender
Run "MpCmdRun.exe -removedefinitions -dynamicsignatures"
Run "MpCmdRun.exe -SignatureUpdate"
Alternatively, the latest definition is available for download here:
βhttps://learn.microsoft.com/en-gb/defender-endpoint/microsoft-defender-antivirus-updates
WatchGuard
Login to your WatchGuard instance and go to Configure > Endpoints > Workstations and servers.
You should see the list of security policies you've created here. Open the security policy in which you want to whitelist SuperOps.
Please ensure the policy you edit is mapped to the client assets that you manage. You can check this by going to Recipients > View computers.
In your policy open Advanced Protection. Under code injection exclusions, exclude superops.exe.
Hit Save once done.