Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
General Security Discussions
Any real-time software that uses non-traditional ways to find malware?
Message
<blockquote data-quote="danb" data-source="post: 916334" data-attributes="member: 62850"><p>We have discussed this multiple times on multiple threads with your multiple accounts. Where is this proof of best practices? All you have to do is provide a link and you will have proven your point. Since I am such a HUGE fan of evidence, here is some that demonstrates why permanently disabling these items is a VERY bad idea... please read the entire thread.</p><p></p><p>[URL unfurl="true"]https://malwaretips.com/threads/wscript-trying-to-run.102059/[/URL]</p><p></p><p>Correct, vendors do not disable vulnerable processes for many reasons, including support requests. There are probably other reasons that I suggest, but it doesn't matter because you just admitted that they do not disable them.</p><p></p><p>VS is highly flexible and admins can prevent end user from auto allowing new items, in multiple different ways, including locally and in the web management console. If there is an even better way to handle these, we could easily add an option to accommodate this, and actually, the more I think about it, maybe I will add an option to silently block scripts and fileless malware until it is approved by the admin (which already exists as an option for all items). Either way, at least VS is refined to the point that it does not require VENDOR CO-MANAGEMENT of the web management console <img class="smilie smilie--emoji" loading="lazy" alt="🤣" title="Rolling on the floor laughing :rofl:" src="https://cdn.jsdelivr.net/joypixels/assets/6.6/png/unicode/64/1f923.png" data-shortname=":rofl:" />.</p></blockquote><p></p>
[QUOTE="danb, post: 916334, member: 62850"] We have discussed this multiple times on multiple threads with your multiple accounts. Where is this proof of best practices? All you have to do is provide a link and you will have proven your point. Since I am such a HUGE fan of evidence, here is some that demonstrates why permanently disabling these items is a VERY bad idea... please read the entire thread. [URL unfurl="true"]https://malwaretips.com/threads/wscript-trying-to-run.102059/[/URL] Correct, vendors do not disable vulnerable processes for many reasons, including support requests. There are probably other reasons that I suggest, but it doesn't matter because you just admitted that they do not disable them. VS is highly flexible and admins can prevent end user from auto allowing new items, in multiple different ways, including locally and in the web management console. If there is an even better way to handle these, we could easily add an option to accommodate this, and actually, the more I think about it, maybe I will add an option to silently block scripts and fileless malware until it is approved by the admin (which already exists as an option for all items). Either way, at least VS is refined to the point that it does not require VENDOR CO-MANAGEMENT of the web management console 🤣. [/QUOTE]
Insert quotes…
Verification
Post reply
Top