Main Functions |
Dr.Web for Linux main functions: 1. of malicious programs (for example, viruses, including those that infect mail files and boot records, Trojans, mail worms) and unwanted software (for example, adware, joke programs, dialers). For details on methods used to neutralize threats, refer to Appendix A. Types of Computer Threats. The product uses several malware detection methods simultaneously: •Signature analysis, which allows detection of known threats •Heuristic analysis, which allows detection of threats that are not present in virus databases •Dr.Web Cloud service that collects up-to-date information about recent threats and sends it to Dr.Web products. Note that the heuristics analyzer may raise false alarms. Thus, objects that contain threats detected by the analyzer are considered “suspicious”. It is recommended to quarantine such files and send them for analysis to Doctor Web anti-virus laboratory. For details on methods used to neutralize threats, refer to Appendix B. Neutralizing Computer Threats. File system scanning can be started in two ways: on demand and automatically, according to the schedule. There are two modes of scanning: full scan (scan of all file system objects) and custom scan (scan of selected objects: directories or files). Moreover, the user can start a separate scan of volume boot records and executable files that ran currently active processes. In the latter case, if a malicious executable file is detected, it is neutralized and all processes run by this file are forced to terminate. For operating systems that have a graphic desktop environment, there is the integration of scanning functions with control panel as well as with file manager. In operating systems with mandatory access to files with several different access levels, the scanning of files, which are unavailable on the current access level, can be performed in autonomous copy mode. Command-line management tool included in the product allows to scan for threats file systems of remote network hosts, that provide remote terminal access via SSH.
2.. File events and attempts to run executable files are monitored. This feature allows to detect and neutralize malware at its attempt to infect the computer. 3.. All attempts to access Internet servers (web servers, mail servers, file servers) are monitored in order to block access to the websites of the unwanted categories, and to prevent the transfer of email messages with infected files, unwanted links or spam. Check of email messages and files downloaded for viruses and other threats from the web is performed on the fly. To restrict access to unwanted websites, Dr.Web for Linux supports a database of web resource categories that is automatically updated, and black and white lists that are edited by the user. Dr.Web Cloud service is also used to check whether the requested web resource is marked malicious by other anti-virus products of Dr.Web.
4.. Such objects are moved to a special storage, quarantine, to prevent any harm to the system. When moved to quarantine, objects are renamed according to special rules and, if necessary, they can be restored to their original location only on demand. 5. of Dr.Web virus databases and of the anti-virus engine to support a high level of protection against malware. 6.(such as a Dr.Web Enterprise Server, or through a subscription to the Dr.Web AV-Desk service). This mode makes it possible to implement a unified security policy on computers within the protected network. It can be a corporate network, a private network (VPN), or a network of a service provider (for example, of an Internet service provider).
|