Selecting the scan methodScan methods consist of scanning the URLs in IM clients’ messages to know if they are included in the list of suspicious web addresses and / or in the list of phishing web addresses. To improve protection efficiency, you can use the heuristic analysis (i.e., analysis of activity that an object performs in the system). This analysis allows detecting new malicious objects which are not yet described in the databases. When using heuristic analysis, any script included in an IM client’s message is executed in a protected environment. If this script’s activity is typical of malicious objects, the object is likely to be classed as malicious or suspicious. By default, heuristic analysis is enabled. To scan links in the messages using the database of suspicious web addresses:
To scan links in the messages using the database of phishing web addresses:
To enable the heuristic analysis:
|
Page top |