Configuring detection of applications that hackers can use to harm

You can enable or disable detection of legitimate applications that intruders can use to compromise devices or data.

Configuring in the Web Console

In the Web Console, you can detection of legitimate applications that intruders can use to compromise devices or data in the policy properties (Application settings General settingsApplication settings, Scan settings section).

The Detect legitimate applications that intruders can use to compromise devices or data check box enables or disables detection of legitimate applications that intruders can use to compromise the device or data of the user.

This check box is cleared by default.

Configuring in the Administration Console

In the Administration Console, you can detection of legitimate applications that intruders can use to compromise devices or data in the policy properties (General settingsApplication settings, Scan settings section).

The Detect legitimate applications that intruders can use to compromise devices or data check box enables or disables detection of legitimate applications that intruders can use to compromise the device or data of the user.

This check box is cleared by default.

Configuring in the command line

In the command line, you can enable or disable detection of legitimate applications that intruders can use to compromise devices or data by using the DetectOtherObjects setting in the general application settings.

You can edit the setting using command line options or a configuration file that contains all general application settings.

DetectOtherObjects accepts the following values:

Page top