Malware Defender 2.8.0.0001
Not to be confused with an antivirus
The intrusion detectors have different features from the antivirus products since they detect the suspicious behavior and not infected files. These actions might include adding a program to the startup list or changing the parameters of a certain application, such as stopping the antivirus components.
Best deployed after a fresh install of Windows
This tool can help you notice the changes and prevent the ones that can compromise the computer security. When you install the application it is switched automatically to learning mode in order to create the rules for the running software components. That is why it is recommended to install it right after scanning your computer for viruses or installing a clean operating system.
Manually set detection rules
You can also create rules manually by selecting a program or a process and changing the permissions according to your trust level. The rules include complex parameters that enable you to restrict the network access and its ability to create new threads.
Keep suspicious files under surveillance
If you are not sure about a certain component you can create a rule and log all the activity for a certain time interval. You can specify the logged events in order to make an informed decision when you add it to the list of trusted applications.
Thoroughly manage startup items
This tool is also able to identify the startup items and to make changes in order to remove the ones that are not required. This section can be difficult to explore for a casual user since it includes very detailed information about DLL files, drivers and other components initialized during the startup.
To end with
Overall, Malware Defender is a valuable tool for permanently monitoring the changes in the running programs. Although its complexity might be scary at first, the learning mode and its ability to verify certain software publishers make it a good choice even for average users.
Reviewed by Sorin Cirneala on July 29th, 2014
In a hurry? Add it to your Download Basket!
- Kernel blocking access COM interface
- The kernel to intercept access to the Service Manager
- The interception process added to the JOB object
- Interception by registering hotkeys to record keystrokes
Application descriptionMalware Defender is a HIPS (Host Intrusion Prevention System) with low resource usage and latency. It is effective to ...