Behavior_monitoring

Behavior Monitoring

OfficeScan constantly monitors computers (or endpoints) for unusual modifications to the operating system or on installed software. Administrators (or users) can create exception lists that allow certain programs to start despite violating a monitored change, or completely block certain programs. In addition, programs with a valid digital signature or have been certified are always allowed to start.

  1. From the Behavior Monitoring screen, update the following as required:

  2. Refer to Event monitoring rules for information on the different policies.

    Event monitoring rules

    Events

    Description

    Default Action

    Duplicated System File

    Many malicious programs create copies of themselves or other malicious programs using file names used by Windows system files. This is typically done to override or replace system files, avoid detection, or discourage users from deleting the malicious files.

    Assess

    Hosts File Modification

    The Hosts file matches domain names with IP addresses. Many malicious programs modify the Hosts file so that the Web browser is redirected to infected, non-existent, or fake Web sites.

    Assess

    Suspicious Behavior

    Suspicious behavior can be a specific action or a series of actions that is rarely carried out by legitimate programs. Programs exhibiting suspicious behavior should be used with caution.

    Assess

    New Internet Explorer Plugin

    Spyware/grayware programs often install unwanted Internet Explorer plugins, including toolbars and Browser Helper Objects.

    Assess

    Internet Explorer Setting Modification

    Many virus/malware change Internet Explorer settings, including the home page, trusted Web sites, proxy server settings, and menu extensions.

    Assess

    Security Policy Modification

    Modifications in Windows Security Policy can allow unwanted applications to run and change system settings.

    Assess

    Program Library Injection

     

    Many malicious programs configure Windows so that all applications automatically load a program library (DLL). This allows the malicious routines in the DLL to run every time an application starts.

    Assess

    Shell Modification

     

    Many malicious programs modify Windows shell settings to associate themselves to certain file types. This routine allows malicious programs to launch automatically if users open the associated files in Windows Explorer. Changes to Windows shell settings can also allow malicious programs to track the programs used and start alongside legitimate applications.

    Assess

    New Service

     

    Windows services are processes that have special functions and typically run continuously in the background with full administrative access. Malicious programs sometimes install themselves as services to stay hidden.

    Assess

    System File Modification

     

    Certain Windows system files determine system behavior, including startup programs and screen saver settings. Many malicious programs modify system files to launch automatically at startup and control system behavior.

    Assess

    Firewall Policy Modification

     

    The Windows Firewall policy determines the applications that have access to the network, the ports that are open for communication, and the IP addresses that can communicate with the computer. Many malicious programs modify the policy to allow themselves to access to the network and the Internet.

    Assess

    System Process Modification

    Many malicious programs perform various actions on built-in Windows processes. These actions can include terminating or modifying running processes.

    Assess

    New Startup Program

     

    Many malicious programs configure Windows so that all applications automatically load a program library (DLL). This allows the malicious routines in the DLL to run every time an application starts.

    Assess

  3. If you selected domain(s) or client(s) on the client tree, click Save to apply settings to the domain(s) or client(s). If you selected the root icon, choose from the following options:

  1. Under Behavior Monitoring Settings, select the Enable Certified Safe Software Service option.

  2. Certified Safe Software Service allows Behavior Monitoring to reduce the likelihood of false positive detections. It queries Trend Micro cloud servers to verify whether a program detected by either Malware Behavior Blocking or Event Monitoring is a known safe application before permitting user access.

  3. Click Save.

  1. Click the Behavior Monitoring Policy Violation tab.

  2. Modify the default messages in the text box provided.

  3. Click Save.

See also: