Preventive Protection |
On the Preventive Protection tab, you can configure Dr.Web reaction to actions of other programs that can compromise workstation security. Also, you can select a level of protection against exploits. At that, you can configure a separate protection mode for particular applications or configure a general mode whose settings will be applied to all other processes. Block WSL Set the Block WSL flag to block Windows Subsystem for Linux on stations with Dr.Web Agent installed.
Exploit Prevention In the Exploit prevention section, you can configure the blocking of malicious programs that use vulnerabilities of well-known applications. From the corresponding drop-down list, select the required level of protection.
Level of Suspicious Activity Blocking In the Level of suspicious activity blocking section, you can configure a general protection mode whose settings will be applied to all processes if the personal mode from the section below is not specified. You can also protect user data from unwanted changes. Select one of protection levels that anti-virus provides: •Paranoid—maximal protection level when you need total control of access to critical Windows OS objects.
•Medium—protection level at high risk of computer getting infected. In this mode, the access to the critical objects that can be potentially used by malicious software is additionally blocked. •Optimal—protection level that disables automatic changes of system objects, modification of which explicitly signifies a malicious attempt to damage the operating system. •User-defined—protection level that is set by a user (the Server administrator) and based on settings specified in the table below. To specify custom settings of preventive protection level, set the flags in the table of this section to one of the following positions: a)Allow—always allow actions with this object or from this object. b)Ask—prompt the dialog box for setting necessary action by the user for the specific object. c)Block—always deny actions with this object or from this object. If you change table settings when one of the preinstalled levels in the Level of suspicious activity blocking section is set, it automatically changes to User-defined. You can create several independent user-defined profiles. To add a new user-defined profile, click To delete user-defined profile that you had created, select it in the Level of suspicious activity blocking list and click Preventive protection settings allow to monitor the following objects: •Integrity of running applications—detect processes that inject their code into running applications that may compromise computer security. Processes that are added to the exclusion list of the SpIDer Guard component are not monitored. •Integrity of users files—detect processes that modify user files with the known algorithm which indicates that the process may compromise computer security. Processes that are added to the exclusion list of the SpIDer Guard component are not monitored. To protect your data from unauthorized modifications, it is recommended that you set the creation of protected copies for important files. •HOSTS file—the operating system uses this file for simplifying access to the Internet. Changes to this file may indicate virus infection or other malicious program. •Low level disk access—block applications from writing on disks by sectors avoiding the file system. •Drivers loading—block applications from loading new or unknown drivers. Other options control access to critical Windows OS objects and allow protection of the following registry branches from modification (in the system profile as well as in all user profiles). Protected registry branches
In the List of applications with personal parameters of access to the protected objects section, you can configure the separate protection mode for particular applications. To all other processes, the settings specified in the section above will be applied. To Edit a Rule 1.To add one more rule, click a)To configure the added rule, click b)In the opened window, specify the path to the application executable file on a protected workstation. c)Look through default settings and, if necessary, edit them. d)Click Save. 2.To edit an existing rule, click 3.To delete an existing rule, click |