<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[GETOVERX FORUM Community Support - All Forums]]></title>
		<link>https://forum.getoverx.com/</link>
		<description><![CDATA[GETOVERX FORUM Community Support - https://forum.getoverx.com]]></description>
		<pubDate>Fri, 17 Apr 2026 08:41:20 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[PRIORITY UPDATE: GET OVER X SHIELD v3.0.4.1 (Core & Pro)]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=150</link>
			<pubDate>Thu, 02 Apr 2026 23:54:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=150</guid>
			<description><![CDATA[Dear getoverx.com community,<br />
<br />
We are officially announcing the deployment of version 3.0.4.1 for both GET OVER X SHIELD CORE and GET OVER X SHIELD PRO. This iteration represents a significant leap in the response and control capabilities of our security suite.<br />
<br />
In an ever-evolving threat landscape, keeping detection engines up to date is not optional. We strongly urge all users to upgrade immediately to ensure maximum defense efficiency across their systems.<br />
What’s New in v3.0.4.1?<br />
<br />
This release focuses on refining our detection algorithms and enhancing the operator's control experience:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">    EDR &amp; EDR-Lite Engine Optimization:</span> We have fine-tuned heuristics and behavioral analysis to reduce false positives while increasing response speed against suspicious thread executions.<br />
    New Internal Encryption System: We’ve implemented a robust encryption layer for internal module communication within the Shield, hardening the application against external tampering attempts.<br />
<span style="font-weight: bold;" class="mycode_b">    Device Management:</span> Critical improvements to the secure USB ejection protocol, ensuring data integrity and closing potential leak vectors during hardware dismounting.<br />
<span style="font-weight: bold;" class="mycode_b">    Security Contexts (PRO Exclusive):</span> Introduction of advanced security contexts for more granular isolation of critical processes.<br />
<span style="font-weight: bold;" class="mycode_b">    EDR Pause Control (CORE):</span> Responding to community feedback, the Core version now allows on-demand pausing of the EDR engine for specific system maintenance tasks.<br />
<br />
Why You Should Update Immediately<br />
<br />
While this is not a response to an active breach, v3.0.4.1 substantially improves your overall Security Posture. Running legacy versions means operating with outdated detection engines against the latest evasion techniques.<br />
<br />
Update Steps:<br />
<br />
    Log in to your download portal at getoverx.com.<br />
    Download the installer corresponding to your license (Core or Pro).<br />
    Run the update; the system will seamlessly migrate your current configurations.<br />
<br />
Keeping your Shield Core or Pro updated is the only way to guarantee that application behavior remains reliable under stress or attack conditions.<br />
<br />
Best regards,<br />
<span style="font-weight: bold;" class="mycode_b">The GET OVER X Engineering Team</span>]]></description>
			<content:encoded><![CDATA[Dear getoverx.com community,<br />
<br />
We are officially announcing the deployment of version 3.0.4.1 for both GET OVER X SHIELD CORE and GET OVER X SHIELD PRO. This iteration represents a significant leap in the response and control capabilities of our security suite.<br />
<br />
In an ever-evolving threat landscape, keeping detection engines up to date is not optional. We strongly urge all users to upgrade immediately to ensure maximum defense efficiency across their systems.<br />
What’s New in v3.0.4.1?<br />
<br />
This release focuses on refining our detection algorithms and enhancing the operator's control experience:<br />
<br />
<span style="font-weight: bold;" class="mycode_b">    EDR &amp; EDR-Lite Engine Optimization:</span> We have fine-tuned heuristics and behavioral analysis to reduce false positives while increasing response speed against suspicious thread executions.<br />
    New Internal Encryption System: We’ve implemented a robust encryption layer for internal module communication within the Shield, hardening the application against external tampering attempts.<br />
<span style="font-weight: bold;" class="mycode_b">    Device Management:</span> Critical improvements to the secure USB ejection protocol, ensuring data integrity and closing potential leak vectors during hardware dismounting.<br />
<span style="font-weight: bold;" class="mycode_b">    Security Contexts (PRO Exclusive):</span> Introduction of advanced security contexts for more granular isolation of critical processes.<br />
<span style="font-weight: bold;" class="mycode_b">    EDR Pause Control (CORE):</span> Responding to community feedback, the Core version now allows on-demand pausing of the EDR engine for specific system maintenance tasks.<br />
<br />
Why You Should Update Immediately<br />
<br />
While this is not a response to an active breach, v3.0.4.1 substantially improves your overall Security Posture. Running legacy versions means operating with outdated detection engines against the latest evasion techniques.<br />
<br />
Update Steps:<br />
<br />
    Log in to your download portal at getoverx.com.<br />
    Download the installer corresponding to your license (Core or Pro).<br />
    Run the update; the system will seamlessly migrate your current configurations.<br />
<br />
Keeping your Shield Core or Pro updated is the only way to guarantee that application behavior remains reliable under stress or attack conditions.<br />
<br />
Best regards,<br />
<span style="font-weight: bold;" class="mycode_b">The GET OVER X Engineering Team</span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ACTUALIZACIÓN PRIORITARIA: GET OVER X SHIELD v3.0.4.1 (Core & Pro)]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=149</link>
			<pubDate>Thu, 02 Apr 2026 23:51:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=149</guid>
			<description><![CDATA[Estimada comunidad de getoverx.com,<br />
<br />
Anunciamos el despliegue oficial de la versión 3.0.4.1 para nuestras soluciones <span style="font-weight: bold;" class="mycode_b">GET OVER X SHIELD CORE y GET OVER X SHIELD PRO</span>. Esta iteración representa un salto cualitativo en la capacidad de respuesta y control de nuestra suite de seguridad.<br />
<br />
En un entorno de amenazas en constante evolución, la actualización de los motores de detección no es opcional. Instamos a todos los usuarios a realizar el upgrade para asegurar la máxima eficacia de sus sistemas de defensa.<br />
¿Qué hay de nuevo en la v3.0.4.1?<br />
<br />
Esta versión se centra en el refinamiento de nuestros algoritmos de detección y en la experiencia de control del operador:<br />
<br />
 <span style="font-weight: bold;" class="mycode_b">   Optimización de Motores EDR y EDR-Lite: </span>Hemos ajustado la heurística y el análisis de comportamiento para reducir falsos positivos y aumentar la velocidad de respuesta ante hilos de ejecución sospechosos.<br />
    Nuevo Sistema de Cifrado Interno: Implementamos una capa de cifrado robusta para la comunicación interna de los módulos del Shield, blindando la aplicación contra intentos de manipulación externa.<br />
   <span style="font-weight: bold;" class="mycode_b"> Gestión de Dispositivos:</span> Mejoras críticas en el protocolo de expulsión segura de unidades USB, garantizando la integridad de los datos y cerrando vectores de fuga durante el desmontaje de hardware.<br />
    Contextos de Seguridad (Exclusivo PRO): Introducción de contextos de seguridad avanzados para un aislamiento más granular de procesos críticos.<br />
   <span style="font-weight: bold;" class="mycode_b"> Control de Pausa EDR (CORE):</span> Atendiendo a las peticiones de la comunidad, ahora la versión Core permite pausar el motor EDR bajo demanda para tareas de mantenimiento específicas del sistema.<br />
<br />
Por qué actualizar de inmediato<br />
<br />
Aunque no se trata de una brecha de seguridad abierta, la v3.0.4.1 mejora sustancialmente la "postura de defensa" (Security Posture). Correr versiones anteriores significa operar con motores de detección desactualizados frente a las técnicas de evasión más recientes.<br />
<br />
Pasos para la actualización:<br />
<br />
    Accede a tu panel de descargas en getoverx.com.<br />
    Descarga el instalador correspondiente a tu licencia (Core o Pro).<br />
    Ejecuta la actualización; el sistema migrará tus configuraciones actuales de forma transparente.<br />
<br />
Mantener el Shield Core o Pro actualizado es la única forma de garantizar que el comportamiento de la aplicación sea el esperado bajo condiciones de estrés o ataque.<br />
<br />
Atentamente,<br />
El Equipo de Ingeniería de GET OVER X]]></description>
			<content:encoded><![CDATA[Estimada comunidad de getoverx.com,<br />
<br />
Anunciamos el despliegue oficial de la versión 3.0.4.1 para nuestras soluciones <span style="font-weight: bold;" class="mycode_b">GET OVER X SHIELD CORE y GET OVER X SHIELD PRO</span>. Esta iteración representa un salto cualitativo en la capacidad de respuesta y control de nuestra suite de seguridad.<br />
<br />
En un entorno de amenazas en constante evolución, la actualización de los motores de detección no es opcional. Instamos a todos los usuarios a realizar el upgrade para asegurar la máxima eficacia de sus sistemas de defensa.<br />
¿Qué hay de nuevo en la v3.0.4.1?<br />
<br />
Esta versión se centra en el refinamiento de nuestros algoritmos de detección y en la experiencia de control del operador:<br />
<br />
 <span style="font-weight: bold;" class="mycode_b">   Optimización de Motores EDR y EDR-Lite: </span>Hemos ajustado la heurística y el análisis de comportamiento para reducir falsos positivos y aumentar la velocidad de respuesta ante hilos de ejecución sospechosos.<br />
    Nuevo Sistema de Cifrado Interno: Implementamos una capa de cifrado robusta para la comunicación interna de los módulos del Shield, blindando la aplicación contra intentos de manipulación externa.<br />
   <span style="font-weight: bold;" class="mycode_b"> Gestión de Dispositivos:</span> Mejoras críticas en el protocolo de expulsión segura de unidades USB, garantizando la integridad de los datos y cerrando vectores de fuga durante el desmontaje de hardware.<br />
    Contextos de Seguridad (Exclusivo PRO): Introducción de contextos de seguridad avanzados para un aislamiento más granular de procesos críticos.<br />
   <span style="font-weight: bold;" class="mycode_b"> Control de Pausa EDR (CORE):</span> Atendiendo a las peticiones de la comunidad, ahora la versión Core permite pausar el motor EDR bajo demanda para tareas de mantenimiento específicas del sistema.<br />
<br />
Por qué actualizar de inmediato<br />
<br />
Aunque no se trata de una brecha de seguridad abierta, la v3.0.4.1 mejora sustancialmente la "postura de defensa" (Security Posture). Correr versiones anteriores significa operar con motores de detección desactualizados frente a las técnicas de evasión más recientes.<br />
<br />
Pasos para la actualización:<br />
<br />
    Accede a tu panel de descargas en getoverx.com.<br />
    Descarga el instalador correspondiente a tu licencia (Core o Pro).<br />
    Ejecuta la actualización; el sistema migrará tus configuraciones actuales de forma transparente.<br />
<br />
Mantener el Shield Core o Pro actualizado es la única forma de garantizar que el comportamiento de la aplicación sea el esperado bajo condiciones de estrés o ataque.<br />
<br />
Atentamente,<br />
El Equipo de Ingeniería de GET OVER X]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Para que sirve Carpeta Safe Folder]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=148</link>
			<pubDate>Mon, 23 Feb 2026 03:12:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7793">AdrianGomez</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=148</guid>
			<description><![CDATA[¿Para qué sirve la Safe Folder, dónde se crea (ProgramData) y qué permisos/recomendaciones de uso tiene?]]></description>
			<content:encoded><![CDATA[¿Para qué sirve la Safe Folder, dónde se crea (ProgramData) y qué permisos/recomendaciones de uso tiene?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Reglas de firewall / red para una empresa]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=147</link>
			<pubDate>Mon, 23 Feb 2026 03:11:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7793">AdrianGomez</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=147</guid>
			<description><![CDATA[¿Qué conexiones de red realiza GetOverX Shield (si aplica) y qué reglas de firewall o proxies corporativos pueden requerirse?]]></description>
			<content:encoded><![CDATA[¿Qué conexiones de red realiza GetOverX Shield (si aplica) y qué reglas de firewall o proxies corporativos pueden requerirse?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[¿Cómo se manejan las actualizaciones en Get Over X Shield?]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=146</link>
			<pubDate>Mon, 23 Feb 2026 03:10:10 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7793">AdrianGomez</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=146</guid>
			<description><![CDATA[“¿Cómo se manejan las actualizaciones: se reinstala encima, se usa actualizador, o se recomienda desinstalar primero? ¿Qué datos se conservan?”]]></description>
			<content:encoded><![CDATA[“¿Cómo se manejan las actualizaciones: se reinstala encima, se usa actualizador, o se recomienda desinstalar primero? ¿Qué datos se conservan?”]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Requisitos previos para Get Over X PRO]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=145</link>
			<pubDate>Mon, 23 Feb 2026 03:09:00 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7793">AdrianGomez</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=145</guid>
			<description><![CDATA[“¿Qué prerrequisitos debo instalar antes de GetOverX Shield (por ejemplo .NET, Visual C++ Runtime, actualizaciones de Windows) para evitar problemas?”]]></description>
			<content:encoded><![CDATA[“¿Qué prerrequisitos debo instalar antes de GetOverX Shield (por ejemplo .NET, Visual C++ Runtime, actualizaciones de Windows) para evitar problemas?”]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Instalación silenciosa / despliegue]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=144</link>
			<pubDate>Mon, 23 Feb 2026 03:07:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7804">AlexisTurner</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=144</guid>
			<description><![CDATA[“¿GetOverX Shield soporta instalación silenciosa (silent install) y qué parámetros se recomiendan para despliegues en varios equipos?”]]></description>
			<content:encoded><![CDATA[“¿GetOverX Shield soporta instalación silenciosa (silent install) y qué parámetros se recomiendan para despliegues en varios equipos?”]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Ayuda con Actualizacion en limpio en Window 11h1]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=143</link>
			<pubDate>Mon, 23 Feb 2026 03:05:09 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7804">AlexisTurner</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=143</guid>
			<description><![CDATA[Hola, <br />
<br />
necesito apoyo para realizar una <span style="font-weight: bold;" class="mycode_b">instalación/actualización en limpio</span> en <span style="font-weight: bold;" class="mycode_b">Windows 11 (H1)</span>. ¿Cuál es el procedimiento recomendado para hacerlo correctamente, qué debo respaldar antes, y qué pasos seguir para evitar problemas con drivers, activación y compatibilidad de programas?]]></description>
			<content:encoded><![CDATA[Hola, <br />
<br />
necesito apoyo para realizar una <span style="font-weight: bold;" class="mycode_b">instalación/actualización en limpio</span> en <span style="font-weight: bold;" class="mycode_b">Windows 11 (H1)</span>. ¿Cuál es el procedimiento recomendado para hacerlo correctamente, qué debo respaldar antes, y qué pasos seguir para evitar problemas con drivers, activación y compatibilidad de programas?]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Ayuda para instalar Get Over X Shield en Windows 7sp2 64bits]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=142</link>
			<pubDate>Mon, 23 Feb 2026 03:02:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7803">DiegoCarter</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=142</guid>
			<description><![CDATA[Hola.<br />
<br />
Soy nuevo con Get OverX Shield, compre la version CORE. quisiera saber como se instala en windows 7SP2 me da muchos errores y no logro instalarlo<br />
<br />
Gracias]]></description>
			<content:encoded><![CDATA[Hola.<br />
<br />
Soy nuevo con Get OverX Shield, compre la version CORE. quisiera saber como se instala en windows 7SP2 me da muchos errores y no logro instalarlo<br />
<br />
Gracias]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help Installing Windows 2012R2 Get Over X Server]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=141</link>
			<pubDate>Mon, 23 Feb 2026 03:00:04 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7807">LucasReed</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=141</guid>
			<description><![CDATA[Hi, I’m trying to install <span style="font-weight: bold;" class="mycode_b">GetOverX Shield Server Edition</span> on <span style="font-weight: bold;" class="mycode_b">Windows Server 2012 R2 (64-bit)</span>, but the antivirus components don’t start correctly. During the update step, <span style="font-weight: bold;" class="mycode_b">freshclam.exe</span> throws missing runtime DLL errors (e.g., <span style="font-weight: bold;" class="mycode_b">VCRUNTIME140.dll</span> / <span style="font-weight: bold;" class="mycode_b">api-ms-win-crt-runtime-l1-1-0.dll</span>). What are the required prerequisites for Server 2012 R2, and what is the recommended fix to complete the installation successfully? Thanks<br />
<br />
<img src="https://i.postimg.cc/025z3b6H/Captura-de-pantalla-2026-02-22-192755.png" loading="lazy"  alt="[Image: Captura-de-pantalla-2026-02-22-192755.png]" class="mycode_img" /><br />
<br />
<br />
<img src="https://i.postimg.cc/cCFLZBKj/Captura-de-pantalla-2026-02-22-193158.png" loading="lazy"  alt="[Image: Captura-de-pantalla-2026-02-22-193158.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[Hi, I’m trying to install <span style="font-weight: bold;" class="mycode_b">GetOverX Shield Server Edition</span> on <span style="font-weight: bold;" class="mycode_b">Windows Server 2012 R2 (64-bit)</span>, but the antivirus components don’t start correctly. During the update step, <span style="font-weight: bold;" class="mycode_b">freshclam.exe</span> throws missing runtime DLL errors (e.g., <span style="font-weight: bold;" class="mycode_b">VCRUNTIME140.dll</span> / <span style="font-weight: bold;" class="mycode_b">api-ms-win-crt-runtime-l1-1-0.dll</span>). What are the required prerequisites for Server 2012 R2, and what is the recommended fix to complete the installation successfully? Thanks<br />
<br />
<img src="https://i.postimg.cc/025z3b6H/Captura-de-pantalla-2026-02-22-192755.png" loading="lazy"  alt="[Image: Captura-de-pantalla-2026-02-22-192755.png]" class="mycode_img" /><br />
<br />
<br />
<img src="https://i.postimg.cc/cCFLZBKj/Captura-de-pantalla-2026-02-22-193158.png" loading="lazy"  alt="[Image: Captura-de-pantalla-2026-02-22-193158.png]" class="mycode_img" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Help configuring the Corporate EDR Version]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=140</link>
			<pubDate>Wed, 18 Feb 2026 00:58:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=4110">thomasb4083</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=140</guid>
			<description><![CDATA[<img src="https://i.postimg.cc/mr9qy3pP/edrconfig.png" loading="lazy"  alt="[Image: edrconfig.png]" class="mycode_img" /><br />
<br />
Hello community,<br />
I’m configuring the EDR module and I see it supports rule lists (import/export). I’d like to expand the baseline rules safely without causing false positives or system instability.<br />
<br />
Where do you recommend sourcing reliable rule ideas or detection guidance?<br />
<br />
For example: CISA advisories, NIST recommendations, MITRE ATT&amp;CK mappings, or other reputable public resources that can be translated into EDR rules.<br />
Any suggestions or rule pack structures you’ve tested in real endpoints would be appreciated.<br />
Thanks!]]></description>
			<content:encoded><![CDATA[<img src="https://i.postimg.cc/mr9qy3pP/edrconfig.png" loading="lazy"  alt="[Image: edrconfig.png]" class="mycode_img" /><br />
<br />
Hello community,<br />
I’m configuring the EDR module and I see it supports rule lists (import/export). I’d like to expand the baseline rules safely without causing false positives or system instability.<br />
<br />
Where do you recommend sourcing reliable rule ideas or detection guidance?<br />
<br />
For example: CISA advisories, NIST recommendations, MITRE ATT&amp;CK mappings, or other reputable public resources that can be translated into EDR rules.<br />
Any suggestions or rule pack structures you’ve tested in real endpoints would be appreciated.<br />
Thanks!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Recien instale Get Over X Server V3.0.4.1]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=139</link>
			<pubDate>Mon, 16 Feb 2026 18:28:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7800">LuisAnderson</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=139</guid>
			<description><![CDATA[Tengo preguntas.<br />
<br />
¿Que funciones trae diferentes en comparación a la versión 3.0.2?<br />
<br />
Me encanta que sea multilingüe y tiene algo mas que hace que funcione mejor.<br />
<br />
Gracias]]></description>
			<content:encoded><![CDATA[Tengo preguntas.<br />
<br />
¿Que funciones trae diferentes en comparación a la versión 3.0.2?<br />
<br />
Me encanta que sea multilingüe y tiene algo mas que hace que funcione mejor.<br />
<br />
Gracias]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Problemas para ejecutar programas desde appdata]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=138</link>
			<pubDate>Sat, 14 Feb 2026 18:46:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=7802">SantiagoHarris</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=138</guid>
			<description><![CDATA[Hola Buenos Dias<br />
<br />
Instale Get Over X  Shield Core  V3.0.4.1 e instale un programa portable que se instala en appdata. y cuando lo ejecuto el EDR-lite me lo Cierra y me da un mensaje que dice programa ejecutado de ubicación peligrosa. <br />
<br />
1. ¿Que quiere decir?<br />
2. Como ejecuto el programa portable.<br />
<br />
Gracias por la ayuda!]]></description>
			<content:encoded><![CDATA[Hola Buenos Dias<br />
<br />
Instale Get Over X  Shield Core  V3.0.4.1 e instale un programa portable que se instala en appdata. y cuando lo ejecuto el EDR-lite me lo Cierra y me da un mensaje que dice programa ejecutado de ubicación peligrosa. <br />
<br />
1. ¿Que quiere decir?<br />
2. Como ejecuto el programa portable.<br />
<br />
Gracias por la ayuda!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - GetOverX Shield macOS 1.0.0]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=137</link>
			<pubDate>Wed, 10 Dec 2025 00:57:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=137</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield macOS <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.0<br />
- Result:<span style="font-weight: bold;" class="mycode_b">0/71</span><br />
All Passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for macOS)</span><br />
When the macOS installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launch of helper tools and installation routines via standard macOS installer mechanisms.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of launch agents / launch daemons and registration of system extensions or network extensions.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of signed and protected components, plus controlled interception for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of basic system, user and process information required for endpoint protection.<br />
<br />
No typical macOS malware behaviours were observed:<br />
- No unauthorised modification of user home directories beyond configuration and logs.<br />
- No mass encryption or deletion of user files.<br />
- No covert network connections to unknown C2 servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean macOS virtual machines or test devices (supported macOS versions).<br />
- Verified:<br />
  - Correct loading of system / network extensions.<br />
  - Real-time monitoring and alerting capabilities.<br />
  - Log generation and integration with the central management console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested macOS build behaves as expected for an endpoint protection agent:<br />
- External engines do not report classic malware; any isolated detection is related to strict policies on system and network extensions.<br />
- Behavioural analysis shows installation, registration of protection components and monitoring activity, without signs of macOS-specific backdoors, data theft or ransomware behaviour.<br />
<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/84c7...1fc593989f</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield macOS <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.0<br />
- Result:<span style="font-weight: bold;" class="mycode_b">0/71</span><br />
All Passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for macOS)</span><br />
When the macOS installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launch of helper tools and installation routines via standard macOS installer mechanisms.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of launch agents / launch daemons and registration of system extensions or network extensions.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of signed and protected components, plus controlled interception for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of basic system, user and process information required for endpoint protection.<br />
<br />
No typical macOS malware behaviours were observed:<br />
- No unauthorised modification of user home directories beyond configuration and logs.<br />
- No mass encryption or deletion of user files.<br />
- No covert network connections to unknown C2 servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean macOS virtual machines or test devices (supported macOS versions).<br />
- Verified:<br />
  - Correct loading of system / network extensions.<br />
  - Real-time monitoring and alerting capabilities.<br />
  - Log generation and integration with the central management console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested macOS build behaves as expected for an endpoint protection agent:<br />
- External engines do not report classic malware; any isolated detection is related to strict policies on system and network extensions.<br />
- Behavioural analysis shows installation, registration of protection components and monitoring activity, without signs of macOS-specific backdoors, data theft or ransomware behaviour.<br />
<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/84c7...1fc593989f</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - GetOverX BlackDog Linux 1.0.0.1]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=136</link>
			<pubDate>Wed, 10 Dec 2025 00:54:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=136</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX BlackDog Linux <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Package SHA-256 hash:</span> [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.1<br />
- Result: <span style="font-weight: bold;" class="mycode_b">0/71]</span><br />
- Isolated detection(s), if any:<br />
 All passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for Linux)</span><br />
When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launching of daemon processes and helper binaries.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of systemd service units / init scripts to start at boot.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of protected binaries and root-level components for monitoring (according to the distribution’s security model).<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> enumeration of system information, running processes and network configuration to build telemetry.<br />
<br />
No destructive Linux malware behaviours were observed:<br />
- No unauthorised modification of `/etc` core configuration beyond its own services.<br />
- No mass deletion or encryption of user data.<br />
- No exfiltration of logs or files to unknown remote hosts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on fresh Debian/Ubuntu-based virtual machines.<br />
- Verified:<br />
  - Proper registration of systemd services.<br />
  - Network and filesystem monitoring components.<br />
  - Log generation under `/var/log` or the configured logging path.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested BlackDog Linux build behaves as expected for a Linux security agent:<br />
- Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools.<br />
- Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity.<br />
<br />
Link test:<br />
<a href="https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/f0d1...0c293f0ca2</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX BlackDog Linux <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Package SHA-256 hash:</span> [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.1<br />
- Result: <span style="font-weight: bold;" class="mycode_b">0/71]</span><br />
- Isolated detection(s), if any:<br />
 All passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for Linux)</span><br />
When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launching of daemon processes and helper binaries.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of systemd service units / init scripts to start at boot.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of protected binaries and root-level components for monitoring (according to the distribution’s security model).<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> enumeration of system information, running processes and network configuration to build telemetry.<br />
<br />
No destructive Linux malware behaviours were observed:<br />
- No unauthorised modification of `/etc` core configuration beyond its own services.<br />
- No mass deletion or encryption of user data.<br />
- No exfiltration of logs or files to unknown remote hosts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on fresh Debian/Ubuntu-based virtual machines.<br />
- Verified:<br />
  - Proper registration of systemd services.<br />
  - Network and filesystem monitoring components.<br />
  - Log generation under `/var/log` or the configured logging path.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested BlackDog Linux build behaves as expected for a Linux security agent:<br />
- Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools.<br />
- Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity.<br />
<br />
Link test:<br />
<a href="https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/f0d1...0c293f0ca2</a>]]></content:encoded>
		</item>
	</channel>
</rss>