Working with the Application Protection Baseline

 

 

 

3. Repeat for every warning message that appears. The number of messages you see

 

depends on how many files the application runs. BlackICE will not display the

 

warning messages again unless the application changes.

Building your

Desktop Protector can learn your application protection preferences as you work. You can

baseline over time

have Desktop Protector ask you for a decision on each program as it launches.

 

To update your baseline as you work:

1.On the Tools menu, select Edit BlackICE Settings, then select the Application Control tab.

2.Select an option under When an unknown application launches.

To have Desktop Protector check with you when it detects an application you have not explicitly allowed to run, select Ask me what to do. This is the default.

To have Desktop Protector automatically shut down any application you have not allowed to run, select Always terminate the application.

Application

If you have enabled the Application Protection component and selected Ask me what to

Protection alerts

do, Desktop Protector alerts you when an unknown application starts. For information

 

about how to respond to these alerts, see “Responding to Application Protection Alerts”

 

on page 56.

 

 

 

Note: To avoid false positives, update your application protection baseline every time

 

you install new software. Installing a new application can change some helper files, such

 

as DLLs, that are already in your baseline. Desktop Protector may flag these as “modified

 

files” until you update your baseline.

Application file

Desktop Protector determines which files are included in the baseline from the file name

types

extensions. Desktop Protector currently checks for these application file types:

 

 

 

 

 

 

 

 

 

Extension

File Type

 

 

 

 

 

dll

Dynamic link library, a collection of resources that enable a

 

 

program file to do its job

 

 

 

 

 

drv

Driver, a small program that enables a device or service to work

 

 

 

 

 

exe

Executable file, containing program instructions

 

 

 

 

 

ocx

Special-purpose program for functions such as scroll bar

 

 

movement and window resizing in Windows applications

 

 

 

 

 

scr

Screensaver program

 

 

 

 

 

sys

Files that control basic operating system functions

 

 

 

 

 

vxd

“Virtual device” that enables other software to work

 

 

 

 

 

 

 

 

43

Page 51
Image 51
Internet Security Systems 3.5, Desktop Protector manual Select an option under When an unknown application launches

3.5, Desktop Protector specifications

Internet Security Systems Desktop Protector 3.5 is a robust cybersecurity solution designed to provide comprehensive protection for personal computers and workstations. As cyber threats continue to evolve, this software aims to protect users against malware, phishing, and other malicious attacks with its advanced feature set and technologies.

One of the main features of Desktop Protector 3.5 is its real-time scanning capability. It constantly monitors files and applications on the system for any signs of malicious activity. This proactive approach ensures that harmful software is detected and neutralized before it can execute, providing users with peace of mind as they navigate the internet or access sensitive information.

Another significant feature is the integrated firewall. This firewall effectively controls incoming and outgoing traffic, offering an additional layer of protection by blocking unauthorized access to the user's network. Users can configure the firewall settings to tailor their security level according to their specific needs, ensuring flexibility and adaptability.

Desktop Protector 3.5 also incorporates advanced heuristic analysis technology. Unlike traditional antivirus solutions that rely primarily on known malware signatures, heuristic analysis examines the behavior of files and applications. This allows the software to identify and block new or unknown threats based on their potential behavior, significantly enhancing its detection capabilities.

The software's user-friendly interface makes it accessible to users of all technical backgrounds. With straightforward navigation and intuitive controls, even those who are not tech-savvy can efficiently manage their security settings and monitor their system's health.

Moreover, Desktop Protector 3.5 offers automated updates, ensuring that the security software remains current with the latest threat definitions and security patches. This feature guarantees that users are always safeguarded against emerging threats without requiring manual intervention.

Another noteworthy characteristic is its low system impact; Desktop Protector 3.5 is designed to operate seamlessly in the background. Users can work, play, or browse the internet without experiencing noticeable lag or performance issues, making it an ideal security solution for both personal and professional environments.

With its combination of powerful features, advanced technologies, and user-centric design, Internet Security Systems Desktop Protector 3.5 stands out as a reliable choice for anyone seeking to enhance their cybersecurity posture in an increasingly digital world.