- Mar 28, 2019
- 569
Real-time file system protection checks all types of media and is triggered by various system events such as accessing a file. Using ThreatSense technology detection methods (as described in the ThreatSense engine parameter setup section), Real-time file system protection can be configured to treat newly created files differently than existing files. For example, you can configure Real-time file system protection to more closely monitor newly created files.
Sources: Real-time file system protection , ThreatSense engine parameters setupThreatSense is technology comprised of many complex threat detection methods. This technology is proactive, which means it also provides protection during the early spread of a new threat. It uses a combination of code analysis, code emulation, generic signatures and virus signatures which work in concert to significantly enhance system security. The scanning engine is capable of controlling several data streams simultaneously, maximizing the efficiency and detection rate.
It is, and he has his methods which he won’t change. None of these suites are designed to be evaluated with just one of their protections running. It’s a good way to evaluate that one protection, but not the overall efficacy of the product for a home user.I'm not sure I agree with Leo's idea of simulating new ransomware by turning off real-time protection (though HIPS is still enabled). It seems like he is associating real-time protection with signatures (starting from 2:48 and onward in the video).
Looking at the ESET documentation, it seems like it's more than just signatures.
Sources: Real-time file system protection , ThreatSense engine parameters setup
However, the fact that HIPS failed to block the ransomware is still of concern which Leo did a good job of highlighting in this test.
You're right. Real Time Protection does more than just basic signature detection. HIPS can't properly work independently, same goes to the newly implemented AI. They're all interconnected, everything is tied to the Real Time Protection. This a very wrong test. Eset is also known to have no true behavior blocker so I never do any bonus dynamic test in the hub when something is detected by signatures. Testing it without Real Time Protection is kind of stupid. Leo does this always. He grabs a product and test without knowing how the product works.I'm not sure I agree with Leo's idea of simulating new ransomware by turning off real-time protection (though HIPS is still enabled). It seems like he is associating real-time protection with signatures (starting from 2:48 and onward in the video).
Looking at the ESET documentation, it seems like it's more than just signatures.
Sources: Real-time file system protection , ThreatSense engine parameters setup
However, the fact that HIPS failed to block the ransomware is still of concern which Leo did a good job of highlighting in this test.
When a product like ESET is so dedicated to scan-time analysis (signatures is almost a dismissive way of putting it -- ESET'S runtime protection takes great care to allow their signature scanning to occur at the right times, like when payloads get dropped or decrypted), it's not fair to test it as a pure behavior blocker which it is not.You're right. Real Time Protection does more than just basic signature detection. HIPS can't properly work independently, same goes to the newly implemented AI. They're all interconnected, everything is tied to the Real Time Protection. This a very wrong test. Eset is also known to have no true behavior blocker so I never do any bonus dynamic test in the hub when something is detected by signatures. Testing it without Real Time Protection is kind of stupid. Leo does this always. He grabs a product and test without knowing how the product works.
I always enjoy your voice of reason.When a product like ESET is so dedicated to scan-time analysis (signatures is almost a dismissive way of putting it -- ESET'S runtime protection takes great care to allow their signature scanning to occur at the right times, like when payloads get dropped or decrypted), it's not fair to test it as a pure behavior blocker which it is not.
It's like treating an electric car like a gas car and doing a range test without charging the electric saw.
All this test really shows is that ESET doesnt have a behavior blocker, which we understand. Hence, as you said, it doesn’t make sense to do a bonus dynamic test of the product.
But the way Leo is presenting the results is misleading, almost implying ESET is a poor performing product, and that couldn’t be further from the truth. ESET is not doing worse in the Hub compared to other products, even ones with great dynamic behavior blockers.
When a product like ESET is so dedicated to scan-time analysis (signatures is almost a dismissive way of putting it -- ESET'S runtime protection takes great care to allow their signature scanning to occur at the right times, like when payloads get dropped or decrypted), it's not fair to test it as a pure behavior blocker which it is not.
It's like treating an electric car like a gas car and doing a range test without charging the electric car's battery.
All this test really shows is that ESET doesnt have a behavior blocker, which we understand. Hence, as you said, it doesn’t make sense to do a bonus dynamic test of the product.
But the way Leo is presenting the results is misleading, almost implying ESET is a poor performing product, and that couldn’t be further from the truth. ESET is not doing worse in the Hub compared to other products, even ones with great dynamic behavior blockers.
Well said and me too. He doesn't comment much but when he does it's always insightful and educationalI always enjoy your voice of reason.
However, the fact that HIPS failed to block the ransomware is still of concern which Leo did a good job of highlighting in this test.
I hate everything about this test, and I hate Leo's channel. He's creating an army of retarded users, like this one:
View attachment 236150
Throwing thousands of files, using a script to run them all at once, disabling components in order to test others.
Somehow people think they're learning.
Thanks for your nice constructive reply. Eset implemented Augur into the product around late October last year and recently they also added option to modify detection engine sensitivity from cautious to balanced to aggressive. I've seen some Augur detection but not much yet. Eset preferes avoiding false positives so I guess that's why they haven't unlocked its full potential yet but surely it's going to get better over time.@SeriousHoax may I ask, I didn't know that ESET finally "unleashed Augur" , when did that happen, I mean I remember reading an article about it ! is their and change to the settings regarding it ? and did how much did it influence the product ?
Wow that's really something else . gotta check it out soon. thanks ^_^Thanks for your nice constructive reply. Eset implemented Augur into the product around late October last year and recently they also added option to modify detection engine sensitivity from cautious to balanced to aggressive. I've seen some Augur detection but not much yet. Eset preferes avoiding false positives so I guess that's why they haven't unlocked its full potential yet but surely it's going to get better over time.
Here's a screenshot for you: View attachment 236248
True, I believe ESET's weak point was indeed unknown malware , and that improved recently. However the main point is the methodology here, we simply pointed out that in order for ESET to detect unknown malware you must not disable real time protection, Real-Time Protection in ESET isn't only signatures and cloud lookup, it also has something to do with behavioral detection.Who are you to come and tell me that I eat trash? Do you work at Eset? or are you just a fanboy?
Eset has always had problems detecting unknown malware, with all its modules active or whatever
ESET has never had a problem with unknown, zero-day malware, it is actually one of their core strengths, anyone who says otherwise doesnt know much about the antivirus industry history and specially how ESET works.
ESET does have a behavior blocker, a sandbox, a emulator, dynamic signatures, advanced machine learning/heuristics and one of the best signatures in the market.
Signatures are commonly seen as old technology, this couldnt be more wrong, signatures are the benchmark of the antivirus industry; great vendors have great signatures (and emulators), they are the results of their malware specialists and R&D work, thats why Kaspersky and ESET are superb products, both are leaders in those two areas.