That was just an example above for future reference.
Best answer by DanP
View originalBest answer by DanP
View original"No you can add process to the Identity Shield if you so wish. I dont have the list of native apps that automatically handy at the moment. Any executed process that is unknown in our database will be journalled. If its determined that its bad its changes will be rolled back. This as I said earlier is only one component of our program.
For instance on my PC here, a new version of this application was released recently and its a new .EXE
Monitoring process E:gamesSteamsteamappscommonWar Thunderaces.exe [B2771208D7A3ABD19ADF7F1A7E797AB7]
The client is keeping an eye on what its doing. If it starts doing things that the client determines is bad (behaviour based) it can locally block it too in which case you may see:
Blocked process from accessing protected data C:
oymalwarevaultwebinstallerjd1.exe [Type: 11]"
Now from my scan log:
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 3 (3479)
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 4 (3479)
Fri 17-10-2014 21:38:23.0834 Monitoring process C:Program FilesVoodooShieldVoodooShieldService.exe [3504C7F055D5E2359F7888478AC74BB7]. Type: 6 (3479)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 3 (3478)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 4 (3478)
Fri 17-10-2014 21:38:23.0850 Monitoring process C:Program FilesVoodooShieldVoodooShield.exe [3F527670FE1BFE85E4F00F7183FFEFBE]. Type: 6 (3478)
See the different levels and even Roy showed Level 11 so it would depend on like they said already the Behaviour is taken into account from the Cloud. I don't think they are willing to explain the many levels in public as we don't want to give the malware writers any inside info!
I hope you can understand what I'm trying to say without saying more?
Daniel
@ wrote:
Setting to block does initiate a roll back. In a previous reply, I tested the rollback with a not well known application called Focus Writer (simple word type program). I made a doc on the desktop from Focus Writer, set the process to block, and my file dissappeared due to the rollback procedure.
I guess my question is now:Journalling should start when an Unknown process enters memory and is Monitored.
When does the journaling start?
Ex: I install a PUA app. Its gets auto set to Monitor. Does journaling start after the installation or before?
If it is before, then the above test I did didn't work because the rollback procedure did not delete the installation files of Foucs Writer, only the changes the program did after installation.
Thanks!
Agreed!@ wrote:
Personally, as rare as it is needed to do a Rollback, and as technical as I believe it might be, I think it best to leave it to Support. It is not so simple as simply clicking a button and letting it go.
@ wrote:
At that point the file would be determined Bad on the local machine, and the active process would be terminated. On a scan the cleanup/rollback process would start and any changes made by that file after it was set to monitor would be rolled back along with the generic cleanup routine.@ In the event that the user changes the status from Monitor to Block, what would happen at that point?
Thanks :)
Yes, thank you. That clears it up. I didn't know about Manual Threat Removal also.@ wrote:
@ wrote:Setting to block does initiate a roll back. In a previous reply, I tested the rollback with a not well known application called Focus Writer (simple word type program). I made a doc on the desktop from Focus Writer, set the process to block, and my file dissappeared due to the rollback procedure.I guess my question is now:Journalling should start when an Unknown process enters memory and is Monitored.
When does the journaling start?
Ex: I install a PUA app. Its gets auto set to Monitor. Does journaling start after the installation or before?
If it is before, then the above test I did didn't work because the rollback procedure did not delete the installation files of Foucs Writer, only the changes the program did after installation.
Thanks!
Only the changes made by the monitored process will be journalled, so only those changes would be rolled back.
Using what you saw with Focus Writer as an example, journalling and rollback worked as would be expected. The Monitored file was the Focus Writer application file, which created the document, so the change of the created document was rolled back. Since that process did not create the installation files, those files would not be deleted.
If you wanted to remove the installation files, you would need to go to Manual Threat Removal, and select the installation file for Focus Writer. If the installer was monitored and journalled, the changes made by the installer would rolled back.
-Dan
Perfect.. thanks!@ wrote:
@ wrote:At that point the file would be determined Bad on the local machine, and the active process would be terminated. On a scan the cleanup/rollback process would start and any changes made by that file after it was set to monitor would be rolled back along with the generic cleanup routine.@ In the event that the user changes the status from Monitor to Block, what would happen at that point?
Thanks :)
-Dan
That videos shows that manually marking it blocked, then scan/delete rolls the software back.@ wrote:
Another thing about this if the PUA came as a Bundle the Rollback might remove to the point of the installation of the program. And can go along the lines of this short video: https://community.webroot.com/t5/Webroot-Education/What-Happens-if-Webroot-quot-Misses-quot-a-Virus/ta-p/10202 but it would be nice to hear from some Webroot Threat Researchers on this or even the Developer of that feature?@ will know who!
Thanks,
Daniel ;)
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.