Each type of threat is handled by a separate functional component of the application. You can enable, disable and configure functional components of the application irrespective of each other.
The following functional components of the application serve as protection components:
File Anti-Virus prevents infection of the file system of the protected virtual machine's operating system. The component starts together with the application, continuously remains active in computer memory, and scans all files that are opened, saved, or started in the operating system of the protected virtual machine. File Anti-Virus intercepts every attempt to access a file and scans the file for viruses and other malicious programs.
Mail Anti-Virus scans incoming and outgoing email messages for viruses and other malware.
Web Anti-Virus scans inbound and outbound web traffic of a protected virtual machine, and checks web addresses against the databases of malicious and phishing web addresses.
Firewall protects personal data that is stored in the operating system of the protected virtual machine and blocks all possible threats to the operating system while the protected virtual machine is connected to the Internet or to a local area network. Firewall filters all network activity according to two types of rules: network rules for applications and network packet rules.
Network Attack Blocker scans inbound network traffic for activity that is typical of network attacks. When the application detects an attempted network attack that targets the protected virtual machine, it blocks network activity originating from the attacking computer.
System Watcher receives information about application activity in the operating system of the protected virtual machine and provides this information to other components for more effective protection. The System Watcher can also protect shared folders against external encryption by monitoring operations performed from a remote computer.
The following functional components of the application serve as control components:
Application Startup Control keeps track of user attempts to start applications and regulates the startup of applications.
Application Privilege Control logs the activity of applications in the operating system of the protected virtual machine, and regulates application activity depending on the group to which the application was assigned by Application Privilege Control. A set of rules is specified for each group of applications. These rules regulate applications’ access to personal data and operating system resources. Personal user data includes user files (the My Documents folder, cookies, user activity information) and files, folders, and registry keys that contain operation settings and important data for the most frequently used applications.
Device Control lets you set flexible restrictions on access to devices that are sources of information (for example, hard drives, removable drives, CD/DVD discs), tools for transferring information (for example, modems) or for converting information to hard copy (for example, printers), or interfaces used by devices to connect to the protected virtual machine (for example, USB or Bluetooth).
Web Control lets you set flexible restrictions on access to web resources for different user groups.