@HarborFront If the File Guard is enabled and configured properly to scan the files then when the scanning is triggered (depends on the configuration but an example would be on write requests to the file which includes when a file is downloaded by the web browser) it will apply it's standard engines to determine if the file is clean or malicious (which will use their own signatures combined with the BitDefender signatures).
When a new program is started up, once again depending on the configuration of the file guard, it'll be scanned by Emsisoft again with the normal real-time engines (also including the BD engine). The execution will be prevented from going any further if it's found to be malicious by either the checksum signatures or the static heuristics (which can include byte detection for example, which is essentially generic detection which most vendors use to detect samples which they haven't even seen yet based on patterns in the executable, based on it's code).
If the program which is starting up is not found to be malicious by the real-time engines then I believe Emsisoft will apply a cloud check-up with the program (may depend on the configuration - if I remember correctly you can opt-out of the cloud network via settings). If the cloud check-up does not recognize the program as being malicious then it'll be allowed to proceed execution and the program start-up request will successfully follow on-to the program starting up, if not the program won't be started any further and will never reach the stages of executing it's own main code. However, if the program is in the cloud and known to be safe/genuine then it may be auto-white-listed (if I recall correctly), probably depends on the settings.
Moving on from all the different scenarios, the Behavior Guard itself won't determine if a program is malicious or not without it executing first. Once the program has started up if it's being monitored by Emsisoft then they'll be watching what activity the program is performing, and as soon as the program attempts to do something which is in the scope of what Emsisoft is configured to intercept, the alert will be displayed and the user is allowed to decide if they wish to quarantine/allow,... etc. That being said, Emsisoft won't know if the program is really malicious or not, however it'll change it's alert based on the reason for interception (since some behavior shows a more clear sign of malware than others, since modifying an AutoRun entry isn't deemed as being "malicious", whereas attempting to inject code into an external genuine program running is deemed to be malicious of course).
I assume this is how Emsisoft works at least based on memory from awhile back - of course they may have changed things around since last time I used them myself.
As for your new product without an AV engine will it detect if the malicious file is dormant?
My product is being designed to be as dynamic as possible - the BB/HIPS will allow the user to allow/block programs from performing specific actions during execution (or Quarantine if the user wishes, which will be recommended in the situation of a program attempting to alter the Master Boot Record for example - it's already working well at blocking Petya through this functionality). The BB/HIPS itself cannot know if a program is malicious since there will be no virus signature database for known malware based on check-sums or static generic detection, however the alerts will change depending on the behavior being intercepted (therefore for an injection attack, the alert will be red to signify that the behavior is indeed malicious and shouldn't be allowed, where the recommended action will be to quarantine, but if the user trusts the program they can allow it).
On top of this, since I am aware that many people mess up with BB/HIPS alerts if they do not know what they are doing, I am investing time in development of dynamic heuristics which will monitor the behavior of the untrusted programs, but instead of alerting the user for specific behavior requests, it'll sit tight until there is clear logged evidence of the program being malicious, and then it'll auto-block (or depending on the configuration, alert the user that the program is showing clear signs of malware and allow them to make a decision). The dynamic heuristics will be sort of an auto-pilot protection mechanism at best on it's default settings, however it's early stages for this feature.
There will be a database of trusted publishers for the white-list to prevent false positive alerts, so lots of genuine software can pass through without bothering you at default settings, however as the user of course this will be changeable via the white-list settings. Chances are there will be a cloud network shortly after the first release (there is no ETA but I hope it's soon), but to do this it'll require funding from the paid version of the product (there will be both a Free and Paid version).
Sorry if anyone thought I hijacked this thread, I didn't mean to if I did!
