Giuseppe,
Thanks for the information that you gave the other writer. Now, please give me detailed instructions on:
*****You should then look at the right logs:
open the SEP > view logs > client management > security logs, you should see there more details on the attack, if the source of the attack is there, block it, for example with the firewall.
You should also try to scan the system with a more aggressive scanner of ours:
open SEP > help and support > download Support Tool, launch it and execute a scan with the Power Eraser.********** ****8*******
Thanks
Al