Serious Discussion Best AVs and Worst AVs in Behavioral Health

AV test labs perform primarily a marketing function.
I agree with that. I've already written that a few times ;) An AV manufacturer that has a brand built on the market will not risk participating in a test where you can be compromised. Marketing-wise, because it cost him a lot.
We talked in this thread about protection which mainly depends on the results of Real-World tests (tests with many 0-day samples).
Eset took only a Bronze Award in Real-World tests, and Avast took the Gold Award.
Ok. But if you look at the table, Eset has the maximum number of stars in all tests.
Besides, the tests were not every month. And what's more - the tests ended before Eset v18. And despite numerous critical remarks about Eset v17 regarding Real-World Protection (that it is weak), it still won the bronze medal. And Kasperky, which is considered by many to be number 1 in this field, does not have any medal. The same Avast/AVG clone called Norton does not appear in the main awards. Surprisingly, with its poorly rated cloud (Sentra), Avira also has a gold medal in Real-World Protection :D
To end this thread, for years this trio has always been mentioned as the best - Kaspersky, Bitdefender and Eset ;)

I do not know Adrian personally. I do not participate in the forum. I have simply known the AvLab portal for many years. I know when this portal was still in its infancy. I know it before Adrian started playing with tests ;)
 
Ok. But if you look at the table, Eset has the maximum number of stars in all tests.

That is why it was awarded as a product of the year. This also suggests that the differences in protection between Bronze and Gold awards are not especially important.
So, about 10 popular AVs can provide similar protection. In this way, we have circled back to my first post in this thread where I said "I am afraid that I do not know which of the 10 most popular AVs could have the best behavioral protection." :)
It is time to rest a little. :emoji_beer:
 
Last edited:
I am still puzzled by how Avira and McAfee have greatly improved in the last 2 years. Did they add something new?
 
Last edited:
Because one can easily totally replace itself within your system while you use it without even letting you know or show any indication while the other can barely catch a cold.
Kaspersky: banned by governments. Dr.Web is also Russian, but isn't banned; what's going on here? But the free version probably would cover yo
 
  • Like
Reactions: simmerskool
And he was critical to avast a few times ...

Yes, I posted about some weaknesses in the Avast protection:
  1. Avast's CyberCapture can be skirted around via DLL hijacking.
  2. Avast (and some other AVs) do not care about UAC bypasses as much as Microsoft Defender.
  3. In older versions of Avast, CyberCapture worked only for files with MOTW.
For example:

About 15 years ago, I installed Avast on my wife's computer, but she managed to bypass manually the Hardened Mode to install an application bundled with adware (she is a skilled IT professional but not security-oriented). For the last 10 years, I have used mainly Windows built-in protection. I sometimes install popular AVs (including Avast) on my personal computer. I use them during the trial period to see how they currently work and seek possible incompatibilities with my applications.
 
Last edited:
It would be good to agree on MT on the meaning of Unknown and FUD malware. Both malware types are strictly related to this thread.

My propositions:
Unknown malware (Never-before-seen) - the malware that is undetected by AV signatures.
Unknown malware can be created by slightly changing the file content, packing/encrypting the known malware sample, code obfuscation, replacing/modifying functions and attack vectors, applying new exploits, using new compilers or scripting engines, etc.

FUD (Fully UnDetectable) malware - the Unknown variant of known malware created by hiding the content of known malware via packing/encrypting or obfuscating.
The Scantime FUD prevents static detection. The Runtime FUD also prevents dynamic detection (uses fileless methods to run the known malware from memory).


Another problem is with 0-day malware. It is used on MT in two different meanings :
  1. Malware that uses a 0-day exploit.
  2. Never-before-seen malware.

Finally the note on "Behavioral Protection."
My proposition: Signature-less protection that uses behavior monitoring or AI signals to detect/block/prevent threats in realtime.
For example, the real-time detonation in the cloud sandbox is part of "Behavioral Protection", but detection via the AV local scan engines is not.
This definition often requires malware execution (locally or in the cloud). However, it also covers features such as HIPs, ASR rules, etc., where benign processes are restricted and malware execution is prevented (for example MS Word cannot execute PowerShell, or suspicious file execution is suspended by local AI to apply additional signature-less security layers).
 
Last edited:
🟥 Vendors Known for Aggressive Telemetry / Logging
These products regularly transmit extensive system and user data—sometimes including full file uploads, usage behavior, browsing history, and more—often without giving the user full control.

VendorTelemetry DetailsNotes
Microsoft DefenderActive by default: cloud protection, behavior analysis, file uploadsCan only be restricted with effort in enterprise environments (Defender for Endpoint)
Avast / AVGPreviously involved in data sales (e.g., via Jumpshot); heavy use of cloud scanningProven privacy issues, despite recent improvements
McAfeeCollects extensive usage data, especially in cloud versionsHigh level of logging, documented in EULAs
Trend MicroUses cloud sandboxing and performs various background analyses (behavior, content, etc.)Temporarily stores user content for analysis
Qihoo 360China-based; known for full file uploads and aggressive scanningNot recommended for use in Western infrastructures
Tencent TAVLacks transparency; aggressive cloud connectionsHighly questionable from a GDPR perspective
Norton / SymantecCloud-based with optional sample uploads and online behavior trackingSome telemetry can be disabled, but not entirely
Comodo / XcitiumStrong behavioral detection and sandboxing; logging practices unclearContainer engine sends large amounts of data with limited user control
K7 AntivirusLimited information; unclear cloud infrastructure, not GDPR-certifiedNo official privacy statement or guarantees

🟩 Vendors with Confirmed Privacy-Friendly Behavior (e.g., Hash-Only Cloud Use)
These vendors focus on local analysis and only perform hash lookups in the cloud—no content is uploaded unless explicitly enabled by the user.

VendorPrivacy DetailsNotes
ESETOnly sends hashes and minimal metadata—never files100% GDPR-compliant with a transparent privacy policy
G DATAFully local analysis; cloud features are optional and can be fully disabled“100% Made in Germany” with a strong focus on data protection
BitdefenderCloud components active by default; file uploads optional and usage clearly documentedHighly configurable in business versions
SophosTransparent cloud use; optional sandboxing; GDPR tools availableCloud components can be configured
Avira (Business)Hash-based cloud lookup; no full uploads without user approvalHosted in the EU; past concerns mainly affected consumer versions
F-SecureCloud lookup via hashes; clear and strict privacy policiesBased in Finland; high level of transparency
CrowdStrike FalconTelemetry is active but highly configurable; no unsolicited file uploadsDesigned for enterprise use with fine-grained control
AhnLab (Korea)Considered privacy-friendly locally; no known violationsLimited documentation, but no public scandals
 
🥇 At the Forefront of Behavioral Protection (Elite Tier)
These vendors represent the cutting edge of security, leveraging advanced machine learning, EDR/XDR, rollback features, memory scanning, and system behavior profiling. They are built to detect and stop even unknown (zero-day) threats without needing prior signature data.


VendorKey Features
SentinelOneAI/ML-powered behavioral engine, automated rollback, static and runtime detection
CrowdStrike FalconReal-time behavioral analysis, cloud-native architecture, rich telemetry and threat correlation
Sophos Intercept XExploit mitigation, CryptoGuard rollback, deep memory inspection
Bitdefender GravityZoneHyperDetect engine, Process Inspector, strong fileless attack defense
Microsoft Defender for EndpointRich behavioral telemetry, tight integration with ATP and SIEM platforms
ESET Enterprise / Protect CompleteAdvanced HIPS, behavior engine, strong protection with minimal cloud reliance

🔐 All of these solutions provide real protection against ransomware, zero-days, and post-exploitation lateral movement.




🟩 Reliable, Solid Behavioral Protection (Mid-High Tier)
These vendors offer dependable behavioral security, though they may lack the depth or automation of elite EDR/XDR platforms. Many rely on hybrid methods (signatures + behavior) and may not offer full rollback or detailed threat correlation.


VendorStrengths
G DATA BusinessDual-engine setup with behavior blocker; reliable exploit protection
Kaspersky Endpoint SecurityStrong "System Watcher" engine; however, geopolitical concerns exist
Trend Micro Apex OneEffective process/memory monitoring, JavaScript ransomware detection
F-Secure ElementsLightweight design with solid behavioral components
Avira (Business)Moderate behavior detection, though lacking advanced EDR functionality
AhnLab V3 Internet SecurityBasic behavioral defense; more suited to regional markets



🟥 Below-Average or Weak Behavioral Protection (Warning Tier)
Solutions in this tier rely heavily on signatures, lack advanced behavioral engines or EDR/XDR capabilities, and are often ineffective against fileless attacks, ransomware, or zero-days. These tools are usually reactive and slower to respond to emerging threats.


VendorWeaknesses
McAfee (Consumer)Outdated design; behavioral detection is weak or inconsistent
AVG / Avast (Free)High false positive rates, poor behavioral detection, mostly reactive
Qihoo 360 / TencentHeavily signature-based, low transparency, cloud-dependent
K7 AntivirusNo public documentation of behavioral features; focuses on basic protection
Comodo / XcitiumBehavior via containers sounds promising but often buggy and prone to false positives
Immunet / ClamAVCommunity-driven; lacks real-time or behavioral protection entirely

💡 Most products in this tier are marketed as free, lightweight, or minimalistic, but they often carry significant drawbacks in terms of telemetry, detection effectiveness, or user control.


These are just a few comparison tables I regularly maintain based on ongoing analysis and global developments.

As for Kaspersky, I believe it’s often unfairly singled out. From a purely technical and professional perspective, I see no valid reason not to use it—or to discourage others from doing so. In fact, Kaspersky has consistently been one of the few vendors actively monitoring for state-sponsored malware and blocking such threats effectively.
 
🟥 Below-Average or Weak Behavioral Protection (Warning Tier)
Solutions in this tier rely heavily on signatures, lack advanced behavioral engines or EDR/XDR capabilities, and are often ineffective against fileless attacks, ransomware, or zero-days. These tools are usually reactive and slower to respond to emerging threats.


VendorWeaknesses
McAfee (Consumer)Outdated design; behavioral detection is weak or inconsistent
AVG / Avast (Free)High false positive rates, poor behavioral detection, mostly reactive
Qihoo 360 / TencentHeavily signature-based, low transparency, cloud-dependent
K7 AntivirusNo public documentation of behavioral features; focuses on basic protection
Comodo / XcitiumBehavior via containers sounds promising but often buggy and prone to false positives
Immunet / ClamAVCommunity-driven; lacks real-time or behavioral protection entirely

💡 Most products in this tier are marketed as free, lightweight, or minimalistic, but they often carry significant drawbacks in terms of telemetry, detection effectiveness, or user control.

I do not think the warning tier is necessary for AVG, Avast, Comodo, and Xcitium, except maybe to warn about a higher rate of false positives.
AVG and Avast (Free) use CyberCapture Sandbox, which is currently (from about 2 years) as effective as advanced Behavioral Protection (at home and SMBs). Unfortunately, this protection does not cover scripts and DLLs, so AVG and Avast cannot replace strong Behavioral Protection in Enterprises.
Comodo/Xcitium Autocontainment + Script Analysis is as effective as advanced Behavioral Protection (also in Enterprises).
 
Last edited:
CyberCapture is indeed a cloud sandboxing system that automatically isolates and uploads new files for analysis. For home users and small businesses, this provides an effective additional layer of protection. However:

Not a full-fledged EDR solution:
Key capabilities are missing, such as cross-process correlation, in-memory inspection, behavioral anomaly detection, or telemetry aggregation—features commonly found in platforms like Bitdefender, Sophos, or SentinelOne.


Limited coverage for non-executable threats:
As you correctly pointed out—attacks via scripts, DLLs, lateral movement, PowerShell, or WMI are barely or not covered. This is exactly where modern behavioral engines become crucial.

Trust concerns with AVG/Avast:
Despite technical advancements like CyberCapture, there remains a significant trust issue:
The Jumpshot data scandal involving the sale of user data to third parties, along with opaque telemetry practices, continue to raise serious privacy concerns—especially in data-sensitive environments.

Comodo (now Xcitium) has been promoting an innovative Zero Trust model for years, featuring default auto-containment—where all unknown processes are executed within a sandbox. While this sounds impressive on paper, in practice, it comes with several limitations:
High False Positives & Compatibility Issues
Lack of Integration / Missing EDR Backbone
Limited Adoption in the Enterprise Sector (which is kindly not necessary in private-usage but anyway)

You're absolutely right—many of these aspects have improved over time, no doubt about that.
However, they still don’t meet my personal requirements, especially when there are stronger alternatives available that not only offer better features but are also often available at very competitive prices or through promotional deals.
 
  • Like
Reactions: Andy Ful
However, they still don’t meet my personal requirements, especially when there are stronger alternatives available that not only offer better features but are also often available at very competitive prices or through promotional deals.

Most Enterprises share your personal requirements. (y)
 
Most Enterprises share your personal requirements. (y)
Fair point — though as a developer, you probably know that cloud sandboxing ≠ behavioral protection, and containment without proper context correlation is more “reaction” than “prevention.”


If Comodo’s autocontainment or AVG’s CyberCapture were truly EDR-grade, you'd expect broader adoption beyond free-tier endpoints and tech forums, right?


Curious how you'd architect behavioral threat detection at scale — as a dev. Would love to hear your take or we can discuss a lil more :)

Because relying on "good enough" AV is how ransomware gets admin privileges without even saying hello. :ROFLMAO:

Don’t get me wrong—and please don’t take this as any sort of attack.
I genuinely appreciate having a conversation with someone who can actually point out improvements and discuss them with solid arguments. It’s refreshing!
 
Fair point — though as a developer, you probably know that cloud sandboxing ≠ behavioral protection, and containment without proper context correlation is more “reaction” than “prevention.”

Nowadays, there is no widely accepted definition of behavioral protection. However, most people would not probably consider cloud sandboxing as a part of behavioral protection.

If Comodo’s autocontainment or AVG’s CyberCapture were truly EDR-grade, you'd expect broader adoption beyond free-tier endpoints and tech forums, right?

I think we both agree that AVG, Avast, and Comodo are not EDR-grade solutions. However, Xcitium is generally considered EDR-grade, but less popular than Microsoft Defender for Endpoint.

Curious how you'd architect behavioral threat detection at scale — as a dev. Would love to hear your take or we can discuss a lil more :)
Because relying on "good enough" AV is how ransomware gets admin privileges without even saying hello. :ROFLMAO:

The future of behavioral protection relies on AI development and Big Data. It is a task for big companies.
I think that average home users who respect SmartScreen can use the default Windows built-in protection + popular AD blocker + popular safe DNS to be "safe enough". The problem can be with happy-clickers, children, and elders. They need additional protection. I do not think the standard Antivirus on default settings can be "good enough" for them.
 
Thanks for the thoughtful reply — I appreciate the nuance you're bringing in!

You're right: the term "behavioral protection" lacks a formalized, industry-wide definition. Still, in practice, most security professionals and EDR vendors converge on a few core principles when referring to it:

  • Process-level telemetry and cross-process correlation
  • Memory and script behavior monitoring
  • Automatic response capabilities (rollback, containment, lateral movement detection)
  • Integration into XDR/SIEM workflows
That’s why I wouldn’t put Comodo/Xcitium in the same behavioral protection league as, say, SentinelOne or Defender for Endpoint — even if it technically checks the “EDR” box. Detection quality, context depth, false positive rates, and incident response integration still vary drastically across EDR-labeled products.

Your point about AI and Big Data shaping the future is spot on — behavioral defense at scale requires massive infrastructure and training data. Which is also why smaller vendors often can’t compete long-term in that space without strong telemetry pipelines.

As for home users: I agree that SmartScreen + built-in Defender + safe DNS + adblock is a decent baseline — for informed users.

But as you rightly mentioned:

“happy-clickers, children, and elders”
→ They need protective defaults, not optional toggles buried in Group Policy or PowerShell. That’s where behavioral AVs (or at least smarter default hardening) really matter.
Always happy to nerd out about this stuff — your insights are solid, and the Gartner link was a great addition. Would love to hear your thoughts on how far you think user education can go vs. enforcement via tech controls 😄
 
  • Like
Reactions: Andy Ful
“happy-clickers, children, and elders”
→ They need protective defaults, not optional toggles buried in Group Policy or PowerShell. That’s where behavioral AVs (or at least smarter default hardening) really matter.

In the home environment, I prefer smart hardening (smart = supported by file reputation). But this usually requires occasional support from the home administrator. Many users cannot get such support, so they must rely on behavioral AVs.
 
"Behavioral Protection"
"Behavioral Analysis"
"Behavior Blocker"
"Behavior ..."

These have no established, industry-wide, standardized definition.

It is up to the software vendor to decide what they mean and what components, mechanisms, methods, and features are included with their own implementation of "Behavioral Protection."

So comparisons can be not straight-forward (grey mud, mostly) and not valid as there is no methodology or basis to make direct comparisons between products that have "Behavioral Protection."

If such an industry-accepted methodology did exist, the AV test labs would be exploiting them for profit via "Behavioral Protection" tests regularly.