Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
EXE Radar Pro v4 (Beta)
Message
<blockquote data-quote="shmu26" data-source="post: 777522" data-attributes="member: 37647"><p>The vulnerable processes are in the Windows folder, and they are set to alert. That behavior is important for security. So you don't want to exclude the whole Windows folder.</p><p></p><p>Exclude is stronger than Allow. It will override an Alert rule. Allow is weaker; it will not override an Alert rule.</p><p></p><p>By default, you will not get alerts from any Windows processes in the Windows folder, except for the vulnerable processes that are set to Alert. So you already have the setting you want, by default.</p><p></p><p>You can manually add (or subtract) any Trusted Vendor you want. If you have a suggestion for the dev, just PM him about it.</p><p>I don't know how he decided which ones to be on the default list, I guess he based himself on both on the software that companies tend to use, and the software that us security geeks tend to use. That's what it looks like, at first glance. But it's customisable, so it doesn't really matter so much what's on the default list.</p><p>One thing is for sure: if Andreas put a vendor on the list, it is a reliable vendor.</p><p>But their sig could still be stolen or faked. So it's always better to have less "Trusted" vendors, as long as it doesn't cause you grief.</p></blockquote><p></p>
[QUOTE="shmu26, post: 777522, member: 37647"] The vulnerable processes are in the Windows folder, and they are set to alert. That behavior is important for security. So you don't want to exclude the whole Windows folder. Exclude is stronger than Allow. It will override an Alert rule. Allow is weaker; it will not override an Alert rule. By default, you will not get alerts from any Windows processes in the Windows folder, except for the vulnerable processes that are set to Alert. So you already have the setting you want, by default. You can manually add (or subtract) any Trusted Vendor you want. If you have a suggestion for the dev, just PM him about it. I don't know how he decided which ones to be on the default list, I guess he based himself on both on the software that companies tend to use, and the software that us security geeks tend to use. That's what it looks like, at first glance. But it's customisable, so it doesn't really matter so much what's on the default list. One thing is for sure: if Andreas put a vendor on the list, it is a reliable vendor. But their sig could still be stolen or faked. So it's always better to have less "Trusted" vendors, as long as it doesn't cause you grief. [/QUOTE]
Insert quotes…
Verification
Post reply
Top