- Mar 28, 2019
- 569
AFAIK System Watcher doesn't contact KSN. File antivirus and other components and Application control do lookup in cloud but AFAIK not System Watcher. And all other components were disabled.Why he testing against old Ransomware, all files hash are known to KSN, so it was clear from the beginning of his test that all of his samples will be detected by System-Watcher
KSN is used by all modules of Kaspersky products, pre and post execution.AFAIK System Watcher doesn't contact KSN. File antivirus and other components and Application control do lookup in cloud but AFAIK not System Watcher. And all other components were disabled.
If you check video you would also see that detections were identified by "Dangerous application behaviour" and not by their name which is usually shown for detections from cloud.
EDIT: of course testing against new malware would better show how good their behaviour blocker is.
If you don't believe me just asking @harlan4096AFAIK System Watcher doesn't contact KSN. File antivirus and other components and Application control do lookup in cloud but AFAIK not System Watcher. And all other components were disabled.
If you check video you would also see that detections were identified by "Dangerous application behaviour" and not by their name which is usually shown for detections from cloud.
OK, thanks for info. I thought System Watcher didn't use KSN since there is no option to disable KSN lookups in System Watcher's settings (similar to option in Application Control). Thank you for explanation.If you don't believe me just asking @harlan4096
We have been performed our testing for years here in the Malware-Hub, it's known that even System-Watcher first check for hash on KSN, detection name is something like "PDM: ..." the file hash matters only and the detection name can be different on KSN.
I believe System watcher didn't contact the cloud in this test. When all components are turned off and KSN is opted out it doesn't connect cloud database. Besides, if you check the notifications they were detected by application behavior and PDM detections. These are not cloud based.
Yes because KART is practically based on KSN, in offline mode it will take much less.Just going to download KART: Free Ransomware Protection | Kaspersky Anti-Ransomware Tool
Every file known to be malicious by KSN: detection name will be something like "PDM.Trojan.Win32.Bazon" (screenshot below)
But offline, KART is unable to detect anything, so it's proven that even detection names like "PDM..." is known to be cloud detection by KSN!
Note: My experience with any product or software is always based of testing by myself instead to speak about theoretical what is might be true...
View attachment 252393
Yes because KART is practically based on KSN, in offline mode it will take much less.
With KIS/KTS if you only want to test the system watcher you are forced to block KSN (no need to exit the KSN agree program because it will protect you anyway)/connection to the internet and close/reopen (alternatively restart the PC) to prevent malware from being taken from the cache generated by KSN.
Yes, but practically this happens almost always on KART. Try with an old and known malware will always be called: "PDM.Trojan.Win32.Bazon".Yes, but practically this happens almost always on KART. Try with an old and known malware will always be called: "PDM.Trojan.Win32.Bazon".
What is different is with the complete product. If it is taken from other modules (KSN included) it will have its specific wording, in the case of KSN will always appear UDS until Kaspersky can contact its cloud or use the existing cache.
The fact that the KSN is also used by the System Watcher is right.
Ok I was wrong in that case then. You learn something new every day. But like Andrew3000 said KVRT is basicaly KSN so it's not the same as Kaspersky's AV lineup.Just going to download KART: Free Ransomware Protection | Kaspersky Anti-Ransomware Tool
Every file known to be malicious by KSN: detection name will be something like "PDM.Trojan.Win32.Bazon" (screenshot below)
But offline, KART is unable to detect anything, so it's proven that even detection names like "PDM..." is known to be cloud detection by KSN!
Note: My experience with any product or software is always based of testing by myself instead to speak about theoretical what is might be true...
View attachment 252393
I chosen KART only as the best example to show about KSN detection like "PDM..."Ok I was wrong in that case then. You learn something new every day. But like Andrew3000 said KVRT is basicaly KSN so it's not the same as Kaspersky's AV lineup.
So my main point still stands which is System Wacther is capable of detecting ransomware without any cloud connection similar to the test done by the YouTuber. Now I can't say without 100% certainty that the tester didn't do anything wrong but like I said above, I myself tested it with Ethernet cable plugged off so not a chance to access the cloud, and it produced similar results.
I even confessed that I was wrong and learned something new. But it feels like you ignored my main point which I already mentioned twice. Cloud based PDM or not System Watcher isI chosen KART only as the best example to show about KSN detection like "PDM..."
Of course, everyone know that KART isn't comparable to KAV/KIS/KTS or free KSC, that is useless to mention by you
For me it doesn't matter what any YouTuber doing wrong or not, I just wrote my commend to what is said wrong by other users here in the forum.
I haven't ignored anything, I just didn't mentioned once more what you said:I even confessed that I was wrong and learned something new. But it feels like you ignored my main point which I already mentioned twice. Cloud based PDM or not System Watcher is