- Content source
- https://youtu.be/PkLGvRNVUC0?si=RQhx6JYij-6NUxXE
By this logic, a seatbelt that only works if you crash in a sedan and not in an SUV should still get a 5-star safety rating – just don’t drive the wrong kind of car.The author wrongly thinks that the AV with poor detection on Network shares and with no post-launch behavior protection should be unrecommended for all users. But in fact, it is true mainly for Enterprise users.
McAfee Total Protection is a home antivirus, so the video is pretty much useless for home users. The author's comments do not help and can be misleading. We can see here a kind of trivial testing loop. Home AV was tested, and the results showed that it should not be used in Enterprises, which was known from the beginning.
However, the video can be helpful for MT readers interested in post-launch behavior protection (the test should also be repeated on malware stored on the hard and flash drives).
The testing methodology of Leo's videos depends on running malware (mainly payloads) from the Network shares. This type of attack vector is rare in the home environment (most users do not have Network shares). From the video, it appears that McAfee AV does not properly check files from Network shares, and its post-launch protection for payloads is inadequate. Such an AV should not be used in Enterprises. In other tests that take into account attacks on home users, McAfee AV scores among top AVs, due to its strong web and pre-launch protection (also behavior-based).
K and B home versions have stronger post-launch behavior protection; actually, B, inspite of its inflated signatures size, is relying more on post-launch behavior protection, compared to K.The author wrongly thinks that the AV with poor detection on Network shares and with no post-launch behavior protection should be unrecommended for all users. But in fact, it is true mainly for Enterprise users.
McAfee Total Protection is a home antivirus, so the video is pretty much useless for home users. The author's comments do not help and can be misleading. We can see here a kind of trivial testing loop. Home AV was tested, and the results showed that it should not be used in Enterprises, which was known from the beginning.
However, the video can be helpful for MT readers interested in post-launch behavior protection (the test should also be repeated on malware stored on the hard and flash drives).
The testing methodology of Leo's videos depends on running malware (mainly payloads) from the Network shares. This type of attack vector is rare in the home environment (most users do not have Network shares). From the video, it appears that McAfee AV does not properly check files from Network shares, and its post-launch protection for payloads is inadequate. Such an AV should not be used in Enterprises. In other tests that take into account attacks on home users, McAfee AV scores among top AVs, due to its strong web and pre-launch protection (also behavior-based).
McAfee had the websites rating and blocking features long before Norton SafeWeb was offered as add-on for Norton 2009 16.5 (it required additional installation and restart).Tried Trellix Endpoint Security, but not McAfee before; TES was very bad compared to SEP, larger install size, slower, more false both positive and negative, with enigmatic settings.
For the sake of truth, McAfee webadvisor extension is excellent, better than Norton safeweb and Symantec browser protection.
to reduce system impact at the expense of protection.McAfee also scans only on-execution
I wouldn’t say protection is reduced as the file is blocked until the analysis takes place. I am more unimpressed with the detection levels where accuracy is prioritised over aggressive detection. Also, McAfee is now fully cloud-based with absolutely no local definitions whatsoever.to reduce system impact at the expense of protection.
Cloud-based AV is not a bad one; K is partially cloud-based and its detection is better than B and ESET, famous of relying on signature (in addition to behavioral protection for B).I wouldn’t say protection is reduced as the file is blocked until the analysis takes place. I am more unimpressed with the detection levels where accuracy is prioritised over aggressive detection. Also, McAfee is now fully cloud-based with absolutely no local definitions whatsoever.
Trend Micro has a better execution of both easy settings, you just switch between 2 modes and the mode controls a host of settings which individually could bamboozle users, and the cloud is mixed with local patterns and definition files.
They are all partially cloud-based but I personally don’t like a fully-cloud based solution with 0 protection capabilities offline. It’s just a personal preference.Cloud-based AV is not a bad one; K is partially cloud-based and its detection is better than B and ESET, famous of relying on signature (in addition to behavioral protection for B).
It is not about being cloud-based, it is about the algorithm used for cloud-based protection.
By this logic, a seatbelt that only works if you crash in a sedan and not in an SUV should still get a 5-star safety rating – just don’t drive the wrong kind of car.
This happens very often when trying to evaluate the effectiveness of solutions, without having any knowledge of their internals and the design choices standing behind them.The seatbelts intended by the manufacturer for use in a sedan should be used in a sedan.
The author took the seatbelts from a sedan and tried to use them in a truck. The latch seatbelts did not fit, and the seatbelts did not work.
The wrong conclusion: The seatbelts are not recommended.
The right conclusion: The seatbelts should be used as intended by the manufacturer.
The useful information from the test: Those seatbelts are not universal.
Yes. Different vendors use different security approaches. Some vendors prefer a preventive and pre-launch approach. Some others like a more universal approach that includes post-launch protection. The first approach can increase the rate of false positives.K and B home versions have stronger post-launch behavior protection; actually, B, inspite of its inflated signatures size, is relying more on post-launch behavior protection, compared to K.
There is pretty much no vendor nowadays that hasn’t utilised all possible approaches one way or another. It’s just the execution that is different.Yes. Different vendors use different security approaches. Some vendors like a preventive and pre-launch approach. Some others like a more universal approach that includes post-launch protection. The first approach usually increases the rate of false positives.
and the second approach if not prompt, can increase the rate of data exfiltration and/or encryption.Yes. Different vendors use different security approaches. Some vendors like a preventive and pre-launch approach. Some others like a more universal approach that includes post-launch protection. The first approach can increase the rate of false positives.
Yes, relying too much on Behavioural Blocking a-la Sophos and Webroot is not amazing. By the time behavioural blocking is triggered and completes remediation, damage may already have been done.and the second approach if not prompt, can increase the rate of data exfiltration and/or encryption.