Forum Discussion
- Derrick Pullen1New MemberSame here John A
- Eric Crawford1New MemberHere's what worked for us, whitelist this: %localappdata%\GoToAssist Remote Support Customer\g2ax_customer_combined_dll_core_win32_x86_1361.exe
Or to avoid the inevitable rename of file... %localappdata%\GoToAssist Remote Support Customer\g2ax*.exe
eric - printerhelpcentNew Contributor
This works for our Windows 7 workstations but for Win 8.1 and Win 10...it doesn't even show up in the list when you do gpresult /r ? Each OS representing a workstation has its own Computer OU..meaning all Win7 workstations in it's OU, Win 8 in it's own and Win 10 in its own.
User is not a local administrator....is Win 8.1 and Win 10 have a different path to AppData ?
To know more about it click here
- wedfghnjmNew Member
I can't believe this is a still a thing in the year 2020. Can you please come up with a way so this can be ran where it doesn't run an exe from app data? It's not safe to allow your average user to run exes at all and especially not from app data where most malware/ransomware is ran from. Most things can be built into browsers now.
- GlennDGoTo Manager
Hi wedfghnjm
Most malware installs to the appdata because that is where legitimate applications run from. If you would like to switch to a browser based experience please switch to GoToAssist v5. You can do this by signing into your account on the website and clicking on the menu in the top right.