I have been using the Webroot for a quite a time and while gong through the notes and news of the product. I came through one of the Webroot's feature “Pseudo Execution” and can’t understand the concept clearly.
- Pseudo execution is the feature of the Webroot executed when the file/code entered in the system is unknown to the Webroot database
- Will be the unknown file executed partially in the system or any sandbox?
- How the journaling will be done and how the logs are stored?
- If the file/code turned out to be good one the product will whitelist and allows for full execution.
- If the file turned out to be a Malware/Ransomware or which leads to harm the system, then will it be quarantined or blocked?
- If blocked will that be notified to the user? Can the user change from Block to Allow?
- What happens to the file after it kept in quarantine, is it still able to access the files in the system or restricted?
- What happens to the files that are effected by the malicious file/code before sent to quarantine will they be Rollbacked or Remediated?
Please help me out with these. Thanks in advance.
Best answer by jhartnerd123View original