Protection against malicious objects in Kaspersky Endpoint Security 8 for Windows

 

 

Kaspersky Endpoint Security 8 for Windows (for file server)

 
 
 

Protection against malicious objects in Kaspersky Endpoint Security 8 for Windows

"設定 / 操作方法"へ戻る
2013 5月 29 Article ID: 7408
 
 
 
 

KSN

Kaspersky Security Network is a special service that provides access to Kaspersky Lab knowledge base containing data on reputation of files, web resources and software. KSN speeds up the response to new threats and enhances the performance of Kaspersky Endpoint Security 8 for Windows protection components.

Participation in Kaspersky Security Network allows collecting data on new types and sources of threats, developing protection methods and reducing risks of false-positive detections efficiently.

Read more about KSN

BSS (Behaviour Stream Signatures)

BSS (Behaviour Stream Signatures) are patterns of dangerous activity that contain data on action sequences defined by Kaspersky Endpoint Security 8 for Windows as malicious actions. By using BSS patterns, System Watcher collects data on application activity and provides the collected data to other protection components. If the application activity corresponds to patterns of dangerous activity, Kaspersky Endpoint Security 8 for Windows performs actions set by administrators (by default, the application terminates the detected malicious process and quarantines it). System Watcher is one of proactive protection components.

Read more about System Watcher

Heuristic analysis

Heuristic analysis is designed to detect unknown and new types of viruses. Heuristic analysis is a protection technology that analyzes executable files for threats that cannot be detected by signature analysis (using antivirus databases).

Read more about Heuristic analysis

Signature analysis

Signature analysis is a protection technology that uses antivirus databases containing descriptions of known threats and methods to neutralize them. Signatures are created according to analysis of malware file copies.

Read more about Signature analysis

iChecker and iSwift

The iChecker and iSwift technologies allow speeding up scan tasks by excluding some files from scan area. Files are exluded according to a special algorithm. iChecker principles are based on counting and remembering checksums of files. iSwift is based on the iChecker technology but for the NTFS file system only. iSwift compares NTFS files' identifiers with values in its database, and decideds whether to check the files according to the received results.

Read more about iChecker and iSwift

 
 
 
 
この情報は役に立ちましたか?
はい いいえ
 

 
 

このサイトへのフィードバック

サイトのデザインに関するご感想や、問題点などをご報告ください。

サイトへのフィードバックを送信 サイトへのフィードバックを送信

ありがとうございます!

お寄せ頂きましたフィードバックは、今後のサイトの改善に役立てて参ります。