04.03.2013 Views

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

OfficeScan 10.6 Administrator's Guide - Trend Micro™ Online Help

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Monitored system events include:<br />

TABLE 7-1. Monitored System Events<br />

EVENTS DESCRIPTION<br />

Duplicated<br />

System File<br />

Hosts File<br />

Modification<br />

Suspicious<br />

Behavior<br />

New Internet<br />

Explorer<br />

Plugin<br />

Internet<br />

Explorer<br />

Setting<br />

Modification<br />

Security<br />

Policy<br />

Modification<br />

Program<br />

Library<br />

Injection<br />

Using Behavior Monitoring<br />

Many malicious programs create copies of themselves or<br />

other malicious programs using file names used by Windows<br />

system files. This is typically done to override or replace<br />

system files, avoid detection, or discourage users from<br />

deleting the malicious files.<br />

The Hosts file matches domain names with IP addresses.<br />

Many malicious programs modify the Hosts file so that the<br />

web browser is redirected to infected, non-existent, or fake<br />

websites.<br />

Suspicious behavior can be a specific action or a series of<br />

actions that is rarely carried out by legitimate programs.<br />

Programs exhibiting suspicious behavior should be used with<br />

caution.<br />

Spyware/grayware programs often install unwanted Internet<br />

Explorer plugins, including toolbars and Browser <strong>Help</strong>er<br />

Objects.<br />

Many virus/malware change Internet Explorer settings,<br />

including the home page, trusted websites, proxy server<br />

settings, and menu extensions.<br />

Modifications in Windows Security Policy can allow unwanted<br />

applications to run and change system settings.<br />

Many malicious programs configure Windows so that all<br />

applications automatically load a program library (DLL). This<br />

allows the malicious routines in the DLL to run every time an<br />

application starts.<br />

7-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!