Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Video Reviews - Security and Privacy
Ransomware Test: Cylance, Sophos, VoodooShield | by VoodooShield
Message
<blockquote data-quote="danb" data-source="post: 638472" data-attributes="member: 62850"><p>Potentially, but please keep in mind that this rule / setting does not apply to everything. As a silly example, we have to exclude explorer.exe from this rule / setting, hehehe for obvious reasons <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />. It would allow pretty much everything <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />.</p><p></p><p>So there are several checks in this rule, otherwise, yeah, we could accidentally allow something we did not want to. I have spent a very long time refining these rules, in an effort to automatically allow as much good stuff as possible, while blocking as much bad stuff as possible, simply to enhance our usability.</p><p></p><p>As you and I have discussed... application control is a very robust and secure technology, but no one uses it because it is too much of a PITA. That is where VS comes in... we are the only user-friendly computer lock. The way we see it... just because traditional application whitelisting is not user-friendly enough for people adopt, that does not mean that the endpoint should not be locked when it is at risk <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" class="smilie smilie--sprite smilie--sprite110" alt=";)" title="Wink ;)" loading="lazy" data-shortname=";)" />.</p><p></p><p>Having said that... if you can find a way around this, please let me know! As I always say... there is not a chance that I thought of everything.</p></blockquote><p></p>
[QUOTE="danb, post: 638472, member: 62850"] Potentially, but please keep in mind that this rule / setting does not apply to everything. As a silly example, we have to exclude explorer.exe from this rule / setting, hehehe for obvious reasons ;). It would allow pretty much everything ;). So there are several checks in this rule, otherwise, yeah, we could accidentally allow something we did not want to. I have spent a very long time refining these rules, in an effort to automatically allow as much good stuff as possible, while blocking as much bad stuff as possible, simply to enhance our usability. As you and I have discussed... application control is a very robust and secure technology, but no one uses it because it is too much of a PITA. That is where VS comes in... we are the only user-friendly computer lock. The way we see it... just because traditional application whitelisting is not user-friendly enough for people adopt, that does not mean that the endpoint should not be locked when it is at risk ;). Having said that... if you can find a way around this, please let me know! As I always say... there is not a chance that I thought of everything. [/QUOTE]
Insert quotes…
Verification
Post reply
Top