- Dec 29, 2014
- 1,716
Have the elements of Flash all listed in the Whitelisted processes in NVT 3.1.0.0. This is because I chose to allow it during installation along with Windows processes. Once the installation was complete, I unchecked "Allow Windows system protected processes" in settings and "Allow all software from the Programs Files folder". I've been over the list of allowed that were allowed during the installation, and I am fairly confident the setup is malware free.
I would rather not block Flash player, as I have Firefox set up to show a pop up for me, so that I can choose to run the player on demand. That mentioned, is there anything that I need to do with NVT to protect against possible Flash drive by attacks? I also have all the elements of Flash being monitored in EMET.
One last question. What should I be wary of when looking at NVT pop ups for a Flash type of attack, should the attack get by EMET? Would it typically be a temp folder thing or more likely something from Windows in the form of a command line? Never seen the details of one of these types of attacks before. NVT is great, but the pop ups can begin to look amazingly alike, so I am trying to understand as much as I can about what to look for from malware attacks.
I would rather not block Flash player, as I have Firefox set up to show a pop up for me, so that I can choose to run the player on demand. That mentioned, is there anything that I need to do with NVT to protect against possible Flash drive by attacks? I also have all the elements of Flash being monitored in EMET.
One last question. What should I be wary of when looking at NVT pop ups for a Flash type of attack, should the attack get by EMET? Would it typically be a temp folder thing or more likely something from Windows in the form of a command line? Never seen the details of one of these types of attacks before. NVT is great, but the pop ups can begin to look amazingly alike, so I am trying to understand as much as I can about what to look for from malware attacks.