|
Component
|
Description
|
|
Behavior Monitoring Detection Pattern 32/64-bit
|
|
|
Behavior Monitoring Core Driver 32/64-bit
|
|
|
Behavior Monitoring Core Service 32/64-bit
|
|
|
Behavior Monitoring Configuration Pattern
|
|
|
Digital Signature Pattern
|
|
|
Policy Enforcement Pattern
|
|
|
Memory Scan Trigger Pattern (32/64-bit)
|
Behavior Monitoring uses the Memory Scan Trigger
Pattern to identify possible threats after detecting the following operations:
After identifying one of these
operations, Behavior Monitoring calls Real-time
Scan's Memory Inspection Pattern to check for
security risks.
For details about the Real-time
Scan operations, see Memory Inspection Pattern.
|
|
Damage Recovery Engine
|
The Damage Recovery Engine receives system events and backup
files before suspicious threats can modify files and perform other malicious behavior.
This
engine also restores the affected files after it receives a file recovery request.
|
|
Damage Recovery Pattern
|
|
|
Program Inspection Monitoring Pattern
|
Views:
Keywords: Program Inspection Monitoring Pattern,Memory Scan Trigger Pattern,Digital Signature Pattern,external device protection,Behavior Monitoring Driver,Damage Recovery Pattern,Behavior Monitoring Detection Pattern,Behavior Monitoring Core Service,rootkit detection,Behavior Monitoring Configuration Pattern,Policy Enforcement Pattern
