It's something I COULD do. The problem is it could already be too late for the system to have to go back and add them to a blacklist of processes. This would also require quite a techy user to work it properly. Most people wouldn't be able to use this properly.woodrowbone said:The interesting part would have been if you did try to run some of the samples it missed in the scan.
Just because WSA mainly works like a behavior blocker, the files actions will be analysed in the cloud and then it springs into action.
All actions during this time is "recorded" by WSA, and then later if detected bad, WSA will perform a "rollback" of all the actions taken by the malware.
The malware is also crippled even if it is not detected, as it is most likely "monitored" by WSA if you execute the file. (It can not leak info, keystrokes and such actions during the time it is monitored)
You can play with this after executing a couple of malware and see for yourself, if you right click on the icon in the task bar and choose: Control Active Processes
Move the processes started by the malware to blocked to see the magic
What then happens will also happen when WSA picks up on the file and detects it, it will remove and rollback all changes by that process.
I posted this before, but I think it is useful for people who do not understand how WSA works:
What happens when Webroot misses a virus
When you get familiar with this product, and learn how it works it is hard to not like it
If you have the time I would really appreciate to see this in one of your videos.
Cheers
/W
spywar said:Thanks woodrowbone for explanations.
If it took weeks to detect the file the system could already have been affected by cryptolocker or be blue screening. Most users won't know how to set up monitoring for particular files and won't bother. Didn't seem to do it automatically either. For advanced users this seems okay but even then the detection rate is incredibly low.woodrowbone said:It's something I COULD do. The problem is it could already be too late for the system to have to go back and add them to a blacklist of processes. This would also require quite a techy user to work it properly. Most people wouldn't be able to use this properly.
Actually, before WSA detects the file (remember it is not allowed to do anything suspicious during this time when it is monitored) even if detection takes days or weeks, it will automatically move the file to blocked and roll back all changes when it is detected.
The user would not have to do anything.
/W
bunyip783 said:If it took weeks to detect the file the system could already have been affected by cryptolocker or be blue screening. Most users won't know how to set up monitoring for particular files and won't bother. Didn't seem to do it automatically either. For advanced users this seems okay but even then the detection rate is incredibly low.woodrowbone said:It's something I COULD do. The problem is it could already be too late for the system to have to go back and add them to a blacklist of processes. This would also require quite a techy user to work it properly. Most people wouldn't be able to use this properly.
Actually, before WSA detects the file (remember it is not allowed to do anything suspicious during this time when it is monitored) even if detection takes days or weeks, it will automatically move the file to blocked and roll back all changes when it is detected.
The user would not have to do anything.
/W
bunyip783 said:I'd be willing to do some private testing and share screenshots of my results I guess. Don't think I need another video of it until I can actually see some of these features for myself.