Endpoint Security and Control: managing the detection of suspicious files and behavior

  • Article ID: 23949
  • Rating:
  • 20 customers rated this article 3.0 out of 6
  • Updated: 15 Mar 2013

Endpoint Security and Control provides two forms of suspicious detection:

  • Suspicious file detection indicates files that have characteristics commonly, though not uniquely, found in malware.
  • Suspicious behavior detection indicates files that are exhibiting behavior commonly, though not uniquely, found in malware.

Note: When Endpoint Security and Control is first installed, suspicious behavior protection is in alert only mode.

When blocking of suspicious behavior and files is enabled, Endpoint Security and Control will

  • block a file that it detects as a suspicious file. You will need to authorize that file if you want it on your system.
  • alert you when it has detected what may be suspicious behavior.

However, Endpoint Security and Control will only indicate that the file or behavior may be a threat, as in some cases it may turn out to be a clean and legitimate file. You will need to look at the file and determine whether you want to continue to block it, or to authorize it.

What to do

Do one of the following:

For more information about how to configure the scanning and detection of suspicious behavior and suspicious files, and how to authorize or block these programs and files, refer to the Enterprise Console help.

If you need more information or guidance, then please contact technical support.

Rate this article

Very poor Excellent