05.08.2013 Views

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TABLE 5-38. Event monitoring rules (Continued)<br />

EVENTS DESCRIPTION<br />

New Internet<br />

Explorer<br />

Plugin<br />

Layered<br />

Service<br />

Provider<br />

Internet<br />

Explorer<br />

Setting<br />

Modification<br />

Security<br />

Policy<br />

Modification<br />

Firewall<br />

Policy<br />

Modification<br />

Program<br />

Library<br />

Injection<br />

Protecting Computers from Security Risks<br />

Spyware/grayware programs often install<br />

unwanted Internet Explorer plugins, including<br />

toolbars and Browser <strong>Help</strong>er Objects.<br />

A Layered Service Provider (LSP) can<br />

manipulate inbound and outbound network<br />

traffic. Malicious programs can use LSPs to<br />

intercept network communication and gain<br />

network access.<br />

Many virus/malware change Internet Explorer<br />

settings, including the home page, trusted<br />

Web sites, proxy server settings, and menu<br />

extensions.<br />

Modifications in Windows Security Policy can<br />

allow unwanted applications to run and<br />

change system settings.<br />

The Windows Firewall policy determines the<br />

applications that have access to the network,<br />

the ports that are open for communication,<br />

and the IP addresses that can communicate<br />

with the computer. Many malicious programs<br />

modify the policy to allow themselves to<br />

access to the network and the Internet.<br />

Many malicious programs configure Windows<br />

so that all applications automatically load a<br />

program library (DLL). This allows the<br />

malicious routines in the DLL to run every<br />

time an application starts.<br />

DEFAULT<br />

ACTION<br />

Assess<br />

Assess<br />

Assess<br />

Assess<br />

Assess<br />

Assess<br />

5-67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!