Webroot Rollback Feature Multi-Part Test (MalwareDoctor)

How many more parts do you want to see in this series?

  • One more should be enough

    Votes: 2 10.0%
  • Two

    Votes: 1 5.0%
  • Three

    Votes: 1 5.0%
  • Four

    Votes: 1 5.0%
  • Five or more( as many as it takes before the trial expires)

    Votes: 15 75.0%

  • Total voters
    20
Product name
Webroot
Pros
  • N/A
CONS
N/A
BOTTOM LINE
Wait and see....

MDTechVideos

Moderator
Thread author
Verified
Staff Member
Well-known
Aug 5, 2012
473



This review has been a long time coming (and quite an interesting one to plan out). Starting in mid-2013 I began contemplating how I would go about testing Webroot but at the same time keeping in mind their rollback feature. Sure I could make this review just like any other av test. If I did it this way someone could (and I mean would) say that Webroot does not work like a traditional antivirus and I did not make a fair test. I agree with these people. If Webroot was designed more so to roll-back malware infections than to block known malicious threats that is how I should test their product. Personally I have little complaints about this system (default-deny is a much better policy than default-allow for unknown files). There is however one big issue: it makes conducting a test of their product difficult. How do you test an antivirus that will supposedly detect ALL unknown files eventually (but score poorly on zero-day test). It is for this reason that Webroot test are becoming more and more hard to find.

I have long-since noticed that AV-Test no longer releases test of Webroot (found this interesting discussion on the Wilders Forum: http://www.wilderssecurity.com/threads/why-is-webroot-no-longer-on-the-av-test-tests.360667/

I figure testing Webroot over an extended period of time is the absolute best way to test their antivirus like they claim it supposedly works (to find out once and for all if their claims are valid). Basically Webroot will be given final remarks after a given amount of time has passed (and at which point this series will end). Rather than just release one big compiled video I have decided to break up the review into smaller parts that will be released following each daily evaluation of Webroot.

Please share your comments, feedback and suggestions below. :)
 

Countryboy_MN

Level 3
Verified
Well-known
May 30, 2013
120
Thanks for doing the multi-test on Webroot. Looking forward to the final result. :D One question though. How does Webroot's firewall compare to other security programs? Or maybe the question should be does it do anything different than the others ? :)
 

MDTechVideos

Moderator
Thread author
Verified
Staff Member
Well-known
Aug 5, 2012
473
Thanks for doing the multi-test on Webroot. Looking forward to the final result. :D One question though. How does Webroot's firewall compare to other security programs? Or maybe the question should be does it do anything different than the others ? :)

I am too. :)

Webroot "enhances" Windows Firewall by implementing outbound protection (while Windows Firewall only offers inbound protection).
 

woodrowbone

Level 10
Verified
Dec 24, 2011
480
Nice initiative! :)
What you could do while you test and execute files is to right click the WSA icon and choose: "Control Active Processes"
From here you will see what files are active and if they are monitored, if you choose to block a monitored file it will perform a "Rollback".
Some files you just see monitored for a short while and then they disappear, Rootkit for example.
They usually delete themselves and spawn new processes, but they will be monitored as well.
A monitored file is restricted in what actions and connections it is allowed to do/use.
The "Identity Shield" will protect the data from leaking/erasing etc while the file is monitored.

/W
 

Petrovic

Level 64
Verified
Honorary Member
Top Poster
Well-known
Apr 25, 2013
5,355
I am too. :)

Webroot "enhances" Windows Firewall by implementing outbound protection (while Windows Firewall only offers inbound protection).
YegorP said:
First off, it's important to understand that the WSA firewall works differently than a traditional firewall in that it works together with the Windows firewall, functioning as the outbound component while the Windows firewall takes care of the inbound traffic. More specifically, it blocks malicious data traffic coming onto your computer. Basically, when both are turned on, they work in tandem to monitor data traffic coming in and out of your computer ports, looking for untrusted process that try to connect to the internet. The result is an intelligent and hassle-free firewall that unintrusively performs in the background, letting our powerful antivirus work it's magic and only steps in if it misses something.
Source: https://community.webroot.com/t5/Webroot-SecureAnywhere-Internet/WSA-Firewall-tests/td-p/4191


JimM said:
Windows 8 presents certain technological limitations to our current firewall implementation and we are evaluating our options in light of those limitations. The operating system itself is locked down in certain respects that limit what third-party firewalls are capable of, which is why you don't see some of the features in Windows 8 that you would otherwise see in older versions of Windows.
Source: https://community.webroot.com/t5/We...ows-8-and-Firewall-settings-in-WSA/td-p/25208

MikeR said:
The Webroot SecureAnywhere firewall and software is compatible with any other antivirus or firewall application, so you should have no problem running our software alongside your other antivirus/firewall. While it is possible for another antivirus or firewall application to interfere with WSA, no part of Webroot should interfere with other firewalls as WSA is built to recognize and co-exist with other legitimate antivirus/firewall applications. Running the Windows firewall alongside our program is recommended and sufficient because the Windows firewall is effective against hostile inbound connections, whereas SecureAnywhere provides effective outbound protection.
Source: https://community.webroot.com/t5/We...ureAnywhere-Firewall-Compatibility/ta-p/19260
 
Last edited by a moderator:

FreddyFreeloader

Level 32
Verified
Top Poster
Well-known
Jul 23, 2013
2,115
Expect to hear lots of excuses from Webroot if it doesn't do so well. They are good at that. However, I don't hear many Webroot users getting infected, either. Personally, I don't want all that malware sitting on my machine...get it off, now! All Webroot has to do is miss just one little change and it's off to the races for malware.
 
Last edited:

MDTechVideos

Moderator
Thread author
Verified
Staff Member
Well-known
Aug 5, 2012
473


I know this series was a little bit shorter than most (and I was) expecting. However, experimenting this time around has given me an even better idea (and more effective) way to test Webroot in the future. What I am planning should get us to 5 or more videos. I wound't count on it being released tomorrow but it is definitely possible in the coming few months. (;
 

Koroke San

Level 29
Verified
Jan 22, 2014
1,804
4pdtl.jpg
 

Behold Eck

Level 15
Verified
Top Poster
Well-known
Jun 22, 2014
719
Expect to hear lots of excuses from Webroot if it doesn't do so well. They are good at that. However, I don't hear many Webroot users getting infected, either. Personally, I don't want all that malware sitting on my machine...get it off, now! All Webroot has to do is miss just one little change and it's off to the races for malware.


Exactly my thoughts as well. I`d prefer something suspicious to be removed than left on the system to be "monitored".

Hopefully the rollback feature will work.
 
Last edited:
  • Like
Reactions: FreddyFreeloader

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top