Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Emsisoft
(Emsisoft) New in 2019.8: One-click network lockdown
Message
<blockquote data-quote="ForgottenSeer 58943" data-source="post: 832750"><p>This is not how WhitelistCloud works at all. WhitelistCloud does not detect behaviors that “attempt to create new firewall rules or change the firewall status”. Furthermore, WhitelistCloud does not “protect the exposed Windows Firewall functions from malicious usage.”</p><p></p><p>Instead, what WhitelistCloud does is…</p><p></p><p>1. Continuously lets the end user and IT Administrators know if ONLY Safe items are running on the endpoint / network.</p><p></p><p>2. Creates a Windows Firewall rule if an unknown Not Safe item is detected, until the end user or IT Administrator approves of the item.</p><p></p><p>These are two very different things.</p></blockquote><p></p>
[QUOTE="ForgottenSeer 58943, post: 832750"] This is not how WhitelistCloud works at all. WhitelistCloud does not detect behaviors that “attempt to create new firewall rules or change the firewall status”. Furthermore, WhitelistCloud does not “protect the exposed Windows Firewall functions from malicious usage.” Instead, what WhitelistCloud does is… 1. Continuously lets the end user and IT Administrators know if ONLY Safe items are running on the endpoint / network. 2. Creates a Windows Firewall rule if an unknown Not Safe item is detected, until the end user or IT Administrator approves of the item. These are two very different things. [/QUOTE]
Insert quotes…
Verification
Post reply
Top