Excessive reply incoming. I would say I am sorry, but I am not really.
There's no public list and it would be difficult to come up with one, as a lot depends. Think of it more as a point system where different actions and attributes of the application increase or lower the rating. There are some more specific rules that target specific exploits or behaviours (like Office applications trying to run script interpreters for example), but they aren't public. We do have plans to give users more insights into how the behaviour blocker came up with its decision, but there are more important things on the list for now.
AMSI is fully supported. So is IOfficeAntiVirus.
We kind of dropped out of them, mostly because we disagree with a lot of the politics and pricing going on. You can literally buy a Tesla Model 3 for what some of the test labs demand a year (~50k US). A lot of test labs also adhere to AMTSO, which is problematic on a completely different level. Again, lots of politics and general bullshit going on.
We don't have either, but you can continue to use both features when using EAM. In general we try not to duplicate features too much.
I can assure you BitDefender is not cheap.
We usually list reviews here:
Browse the ever growing collection of reviews and awards that Emsisoft’s security solutions have received over the years.
blog.emsisoft.com
It's mostly AVLab/CheckLab and VB100 at this point.
It does.
Who knows ...
That probably depends on who you ask. The metric we look at the most are numbers of infected customers. We track these numbers both via support requests but also through data that Microsoft makes available to their partners (MSRT but also through other telemetry they collect). Those numbers have been consistently low for us, much lower than the industry standard. I can't really share the exact numbers, due to NDAs, so feel free to dismiss this as marketing if you don't think I am a credible source or spin things a certain way. But you can check out all those malware removal communities (including our own forum) to look for users who had EAM installed at the time of their infection and you won't find many.
We are at the moment toying with the idea of allowing users to enable cloud lookups for all applications they run. So before an application is allowed to run, EAM would query our cloud backends to see if we know this file is good, bad, or is currently unknown. It's something a lot of users have requested over the years but we have been hesitant mostly because of privacy concerns. That being said, it would be a natural progression to have an option that allows you to limit the system to only run known good applications.
Obviously, we have our own drivers. That's just a requirement really because a lot of the interesting APIs to watch file system actions or filter network traffic only exist in kernel mode. We do limit ourselves to official APIs as much as possible, but that is not always possible (especially when it comes to some of the exploit mitigation stuff). We are a lot less hacky than most other products, which is probably the reason why we haven't bricked systems so far after a Windows update made some changes to undocumented kernel structures or threw assumptions about memory layout out the window. The number of undocumented thinks we use can probably be counted on one hand (mostly in relation to intercepting APCs).
Each component is configurable and you can finetune certain aspects. I think most people would probably criticise that how certain decisions came to be isn't always transparent to them. At the moment those insights into decisions are hidden behind labels. For example, the log may say Behaviour.CryptoMalware was the reason a certain file was quarantined by the behaviour blocker, which probably gives you an idea that the BB thinks the application looks like ransomware, but doesn't necessarily explain to you why it thinks that it is.
We do care more about prevention tests and real-life infection statistics than we do about simple detection tests, correct. That doesn't mean that we don't care about detection tests at all.
Trust me, it is:
View attachment 228463
I threw the Get-MpThreatDetection in there just so you can see that it wasn't the Windows Defender AMSI provider who blocked it.
Here are the commands in case you want to try it yourself:
Code:
[string] $EncodedEicar = 'WDVPIVAlQEFQWzRcUFpYNTQoUF4pN0NDKTd9JEVJQ0FSLVNUQU5EQVJELUFOVElWSVJVUy1URVNULUZJTEUhJEgrSCo='
$EicarCommand = [system.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($EncodedEicar))
Invoke-Expression $EicarCommand
This is essentially completely harmless code. All it does is put the EICAR test file into a string and tries to execute it. Every AV with AMSI support should block it, provided they detect EICAR. If they don't, PowerShell will throw an error that this isn't valid PowerShell code (which is true). Makes for a low risk test anyone can perform at home.
AMSI is unfortunately trivial to bypass. Not saying it is bad because of it, just making sure you are aware of its limitations.
I wouldn't go that far. But we are somewhat decent.
We have similar labels inside the log file.
Price has always been a big contention point, especially in some low income areas. Ultimately it is true that we aren't the cheapest option, but in return you actually get someone to talk to if you ever have any issues.
EAM doesn't issue firewall alerts on its own. It will only alert you if an application that is not trustworthy tries to mess with the Windows Firewall. Other alerts that may be the result of suspicious network acitivty will be masked as behaviour blocker alerts, as the behaviour blocker is essentially also an application based firewall that just makes decisions on its own.