Component
|
Description
|
Behavior Monitoring Detection Pattern 32/64-bit
|
|
Behavior Monitoring Core Driver 32/64-bit
|
|
Behavior Monitoring Core Service 32/64-bit
|
|
Behavior Monitoring Configuration Pattern
|
|
Digital Signature Pattern
|
|
Policy Enforcement Pattern
|
|
Memory Scan Trigger Pattern (32/64-bit)
|
Behavior Monitoring uses the Memory Scan Trigger
Pattern to identify possible threats after detecting the following operations:
After identifying one of these
operations, Behavior Monitoring calls Real-time
Scan's Memory Inspection Pattern to check for
security risks.
For details about the Real-time
Scan operations, see Memory Inspection Pattern.
|
Damage Recovery Engine
|
The Damage Recovery Engine receives system events and backup
files before suspicious threats can modify files and perform other malicious behavior.
This
engine also restores the affected files after it receives a file recovery request.
|
Damage Recovery Pattern
|
|
Program Inspection Monitoring Pattern
|
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page