Does WSA Essentials only scan on access with its cloud database? Under what circumstances will WSA scan a file or executable with its cloud database? I'm assuming WSA Essentials Identity Protection uses something similar to a behavior blocker from within the browser & also limits connections for a particular page, but WSA does not scan HTTP, HTTPS, FTP, SMTP, or POP3 protocols with its cloud database. Am i correct in my understanding of how WSA works. WSA does not scan HTTP, HTTPS, FTP, SMTP, or POP with its cloud AV. Is this correct? I'm trying to learn the fine mechanics of how WSA works so I can make an educated decission on which security products would best compliment WSA for my particular needs. I work with sensitive data, and need to make sure i'm covering all posible entry points that could be exploited. It would be great if I could obtain some detailed documentation or be advised by someone that is very knowledgable on the fine mechanics of WSA.
Thank You in advance!!