as far as I know, if the program is already executed before being blocked by kaspersky firewall or application control it is not applied yet. The rule is applied after you turn the app off and open it again
I tried to block iobit advanced system care service using app control when it was running in background but the service was still running without being killed. Then manually killed the service and then I wouldnt be able to execute anymore
Yes, it would be interesting to see the same bypass without the prog already in memory
and without "resume" used.
I made a test with ZAM already running.
- I run a Deep scan
- I selected deny during the scan
=> cloud blocked : "No internet connection" (no need to quit and run again)
So the bypass seems to be working, by using the Freegate + proxy and the IDE on "pause"
(no other stuff)
A lot of steps have to be done manually, curious to see if a malware can do that without KIS blocking