Configuring the advanced protection

 

The advanced protection lets you establish different security modes to block unknown malware and protect your computers against APTs (advanced persistent threats).

 

Behavior

Audit

In audit mode, Adaptive Defense 360 only reports on detected threats but doesn’t block or disinfect the malware detected.

 

Hardening

This mode allows execution of the unknown programs already installed on users' computers. However, unknown programs coming from external sources (Internet, email, etc.) will be blocked until they are classified. Programs classified as malware will be moved to quarantine. The following options are available:

 

Lock

This mode prevents all unknown programs from running until they are classified. The following options are available:

 

Anti-exploit

The anti-exploit protection prevents malicious programs from exploiting known and unknown (zero-day) vulnerabilities in applications to access computers on the corporate network.

Refer to section Anti-exploit technology for more information about this protection.

To enable it, select the Detect exploits checkbox.

Next, select the operating mode of the protection.

Audit

The protection tracks exploits' activities but doesn't take any action or display any information to the computer user upon detection.

Adaptive Defense 360 will monitor exploits and log exploit detections in the Web console, indicating that the exploit was allowed by the administrator.

Block

The protection will block every exploit it detects. In some cases it may be necessary to end the compromised process or restart the computer.

Select the relevant checkboxes if you want to notify end users every time an exploit is blocked, and if you want to ask users for permission to end a compromised process or restart their computer.

Refer to section Actions on exploits for more information.

 

Exclusions

These settings affect both the antivirus protection and the advanced protection.

This section allows you to configure items on your computers that will not be scanned by Adaptive Defense 360.

Extensions

Allows you to specify file extensions that won't be scanned.

Folders

Allows you to specify folders whose contents won't be scanned.

Files

Allows you to indicate specific files that won't be scanned.

 

Network usage

Every executable file found on users’ computers that is not recognized by Adaptive Defense 360 will be sent by the agent to our server for analysis. This feature is configured so that it has no impact on the performance of the customer’s network (the maximum number of MB that can be transferred in an hour per agent is set by default to 50).

Unknown files are sent only once for all customers using Adaptive Defense 360. Additionally, bandwidth management mechanisms are implemented in order to minimize the impact on the customer’s network.

To configure the maximum number of MB that an agent can send per hour, enter the relevant value and click OK. To establish unlimited transfers, set the value to 0.

 

Privacy

To allow Adaptive Defense 360 to display in the console (reports and forensic analysis tools) the full name and path of the files sent for analysis, select the relevant checkbox in the Privacy tab.

 


 

Related topics

Anti-exploit technology

Actions on exploits

Examples of vulnerability exploit techniques