From eScan Wiki
(Difference between revisions)
Revision as of 10:05, 17 September 2010 WikiSysop (Talk | contribs) ← Previous diff |
Revision as of 10:06, 17 September 2010 WikiSysop (Talk | contribs) Next diff → |
||
Line 77: | Line 77: | ||
Whenever a system object changes, HIPS updates its databases. However, if the number of objects is large, HIPS monitors information such as, the file attributes, file size, and date to ensure that unusual events do not take place. When it detects a potential threat, HIPS alerts the user, blocks the suspicious activities based on user’s input, and stores the report of the activity in a log file. | Whenever a system object changes, HIPS updates its databases. However, if the number of objects is large, HIPS monitors information such as, the file attributes, file size, and date to ensure that unusual events do not take place. When it detects a potential threat, HIPS alerts the user, blocks the suspicious activities based on user’s input, and stores the report of the activity in a log file. | ||
- | |||
__TOC__ | __TOC__ | ||
Line 91: | Line 90: | ||
# It protects operating system files and registry keys from modification by malware. | # It protects operating system files and registry keys from modification by malware. | ||
# It prevents unauthorized code from executing on the computer. | # It prevents unauthorized code from executing on the computer. | ||
- | |||
__TOC__ | __TOC__ |
Revision as of 10:06, 17 September 2010
|
General |
Knowledgebase |
Support |
| · Articles · FAQ · Troubleshooting | · Technical Information - Main Page |
Host Intrusion Prevention System (HIPS) Technology |
|