Behavior Analysis

The Behavior Analysis component allows you to configure Dr.Web reaction on third-party application actions that may result in infecting your computer, e.g., attempts to modify the HOSTS file or to change the critically important system registry keys. When the Behavior Analysis component is enabled, Dr.Web blocks automatic changing of system objects, if such modification explicitly signifies a malicious attempt to harm the operating system. Behavior analysis protects the system against previously unknown malicious programs that can avoid detection by traditional signature-based and heuristic analyses. To determine whether an application is malicious, the component uses the real-time data from Dr.Web cloud service.

To enable or disable Behavior Analysis

1.Open Dr.Web menu Dr.Web icon, then select Security Center.

2.In the open window, click Preventive Protection tile.

3.Enable or disable the Behavior Analysis component by using the switcher .

Figure 68. Enabling/Disabling the Behavior Analysis component

In this section:

Component operation modes

Creating and editing necessary application rules

Protected object description

Behavior Analysis parameters

The default settings are optimal for most cases. Do not change them unnecessarily.

To open Behavior Analysis parameters

1.Make sure Dr.Web operates in administrator mode (the lock at the bottom of the program window is open ). Otherwise, click the lock .

2.Click the Behavior Analysis tile. A component parameters window opens.

Figure 69. Behavior Analysis parameters

You can configure a separate protection level for particular objects and processes or set a general level which settings will be applied to all other processes. To set a general protection level, select it from the drop-down list on the Protection level tab.

Protection levels

Protection level

Description

Optimal (recommended)

This mode is set by default. Dr.Web disables automatic changes of system objects, whose modification explicitly signifies a malicious attempt to harm the operating system. It also blocks low-level application access to disk and protects the HOSTS file from modification, if it explicitly signifies a malicious attempt to harm the operating system.

Note

Only actions by the applications that are not trusted, are blocked.

Medium

If there is a high risk of your computer getting infected, you can increase protection by selecting this mode. In this mode, access to the critical objects, which can be potentially used by malicious software, is blocked.

Note

Using this mode may lead to compatibility problems with legitimate software that uses the protected registry branches.

Paranoid

When required to have total control of access to critical Windows objects, you can select this mode. In this mode, Dr.Web also provides you with interactive control over loading of drivers and automatic running of programs.

User-defined

With this mode, you can set a custom protection level for various objects.

User mode

All changes are saved in the User mode. In this window, you can also create a new protection level for saving necessary settings. The protected objects will be available for reading at all component settings.

You can choose one of the Dr.Web reactions to application attempts to modify the protected objects:

Allow—the access to a protected object will be allowed for all the applications.

Ask—if an application attempts to modify a protected object the notification will be displayed:

Figure 70. Notification example with an access to a protected object request

Block—if an application attempts to modify a protected object the access will be blocked. Herewith, the notification will be displayed:

Figure 71. Notification example with a blocked access to a protected object

To create a new protection level

1.Look through default settings and, if necessary, edit them.

2.Click the Add button.

3.In the open window, enter a name for the new profile.

4.Click OK.

To delete a protection level

1.In the drop-down menu, select a protection level created earlier that you want to delete.

2.Click the Delete button. Predefined profiles cannot be deleted.

3.To confirm the deletion, click OK.

Receiving notifications

If necessary, you can configure desktop and email notifications on Behavior Analysis actions.

See also

Notifications

Application access

To add custom access parameters for certain applications, go to the Application access tab. On this tab, you can add a new application rule, edit or delete an existing one.

Figure 72. Application access parameters

The following management elements are available to work with objects in the table:

The Add button—adding a rule set for the application.

The Edit button—editing existing rule sets.

The Delete button—deleting a rule set.

In the Rule Type (Rule type) column you can see three rule types:

Allow—the Allow all rule is set for all protected objects.

User-defined—different rules are set for protected objects.

Block—the Block all is set for all protected objects.

To add an application rule

1.Click Add.

2.In the open window, click Browse and specify the path to the application executable file.

Figure 73. Adding a rule set for an application

3.Look through default settings and, if necessary, edit them.

4.Click OK.

Protected objects

Protected object

Description

Integrity of running applications

This option allows detection of processes that inject their code into running applications. It indicates that the process may compromise computer security.

HOSTS file

The operating system uses the HOSTS file when connecting to the internet. Changes to this file may indicate virus infection.

Low level disk access

Block applications from writing on disks by sectors while avoiding the file system.

Drivers loading

Block applications from loading new or unknown drivers.

Critical Windows objects

Other options allow protection of the following registry branches from modification (in the system profile as well as in all the users' profiles).

Image File Execution Options

Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options

Windows Multimedia Drivers:

Software\Microsoft\Windows NT\CurrentVersion\Drivers32

Software\Microsoft\Windows NT\CurrentVersion\Userinstallable.drivers

Winlogon registry keys:

Software\Microsoft\Windows NT\CurrentVersion\Winlogon, Userinit, Shell, UIHost, System, Taskman, GinaDLL

Winlogon notifiers:

Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify

Windows registry startup keys:

Software\Microsoft\Windows NT\CurrentVersion\Windows, AppInit_DLLs, LoadAppInit_DLLs, Load, Run, IconServiceLib

Executable file associations:

Software\Classes\.exe, .pif, .com, .bat, .cmd, .scr, .lnk (keys)

Software\Classes\exefile, piffile, comfile, batfile, cmdfile, scrfile, lnkfile (keys)

Software Restriction Policies (SRP):

Software\Policies\Microsoft\Windows\Safer

Browser Helper Objects for Internet Explorer (BHO):

Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects

Autorun of programs:

Software\Microsoft\Windows\CurrentVersion\Run

Software\Microsoft\Windows\CurrentVersion\RunOnce

Software\Microsoft\Windows\CurrentVersion\RunOnceEx

Software\Microsoft\Windows\CurrentVersion\RunOnce\Setup

Software\Microsoft\Windows\CurrentVersion\RunOnceEx\Setup

Software\Microsoft\Windows\CurrentVersion\RunServices

Software\Microsoft\Windows\CurrentVersion\RunServicesOnce

Autorun of policies:

Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run

Safe mode configuration:

SYSTEM\ControlSetXXX\Control\SafeBoot\Minimal

SYSTEM\ControlSetXXX\Control\SafeBoot\Network

Session Manager Parameters:

System\ControlSetXXX\Control\Session Manager\SubSystems, Windows

System services:

System\CurrentControlXXX\Services

Note

If any problems occur during installation of important Microsoft updates or installation and operation of programs (including defragmentation programs), temporarily disable Behavior Analysis.