|
Component
|
Description
|
|
Behavior Monitoring Detection Pattern 32/64-bit
|
|
|
Behavior Monitoring Core Driver 32/64-bit
|
|
|
Behavior Monitoring Core Service 32/64-bit
|
|
|
Behavior Monitoring Configuration Pattern
|
|
|
Digital Signature Pattern
|
|
|
Policy Enforcement Pattern
|
|
|
Memory Scan Trigger Pattern (32/64-bit)
|
Behavior Monitoring uses the Memory Scan Trigger
Pattern to identify possible threats after detecting the following operations:
After identifying one of these
operations, Behavior Monitoring calls Real-time
Scan's Memory Inspection Pattern to check for
security risks.
For details about the Real-time
Scan operations, see Memory Inspection Pattern.
|
|
Damage Recovery Engine
|
The Damage Recovery Engine receives system events and backup
files before suspicious threats can modify files and perform other malicious behavior.
This
engine also restores the affected files after it receives a file recovery request.
|
|
Damage Recovery Pattern
|
|
|
Program Inspection Monitoring Pattern
|
Views:
Keywords: Policy Enforcement Pattern,Program Inspection Monitoring Pattern,Behavior Monitoring Core Service,Behavior Monitoring Detection Pattern,external device protection,rootkit detection,Memory Scan Trigger Pattern,Behavior Monitoring Configuration Pattern,Damage Recovery Pattern,Digital Signature Pattern,Behavior Monitoring Driver
