Adaptive Defense360 monitors every access to the user's data files by the processes run on the computer. This way, if a malicious item manages to infect the computer, it will be possible to accurately determine which files were modified and when.
It will also be possible to determine if those files were sent out over the Internet, the target IP addresses, and other information that may be useful for the subsequent forensic analysis or remediation actions.
Below we list the types of data files that are monitored:
Office documents.
PDF documents.
CAD documents.
Desktop databases.
Browser password stores.
Mail client password stores.
FTP client password stores.
Active Directory password stores.
Certificate and user certificate stores.
Digital Wallet stores.
Browser settings.
Firewall settings.
GPO settings.
Related topics