ryn0tech Posted December 15, 2016 Report Share Posted December 15, 2016 Would be nice to have a feature where if an unknown executable is detected trying to run, that Immunet would halt the process and prompt you to allow once, allow permanently or block, default to block if you do not respond to the prompt after a couple minutes. Would be a good a good optional, additional layer or protection on top of the ETHOS and SPERO engines. I can see where this could become an issue with batch files, scripts, and and the like, possibly, but, that is what exclusions are for. I think this feature would be great, especially for ransomware protection. Link to comment Share on other sites More sharing options...
ritchie58 Posted December 15, 2016 Report Share Posted December 15, 2016 What you're referring to would be a type of H.I.P.S. or auto-sandboxing feature. That would be a nice additional layer of security protocol but the fact is that Immunet does have a form of heuristic capabilities with ETHOS & SPERO enabled. Meaning that Immunet can detect and respond to as yet unseen or unrecognized malicious code. Cheers, Ritchie... Link to comment Share on other sites More sharing options...
summitdeny Posted April 5, 2017 Report Share Posted April 5, 2017 did you provide auto usb scan Link to comment Share on other sites More sharing options...
ritchie58 Posted April 5, 2017 Report Share Posted April 5, 2017 Hello, Immunet does not have active USB scanning. An interesting addition to the software for a future build perhaps.You can plug in the device and once Windows Explorer recognizes the drive just right-click on on that drive and select Scan Now with Immunet's Context Menu Scan. This would be the best method to use before you transfer any files to your computer. Just scan the whole device if you think the data is suspicious or may have been compromised in some manner!If you have Scan Archive Files & Scan Packed Files enabled in Scan Settings this will automatically scan any compressed files downloaded from the USB device to your computer. The transfer of malware from one computer to the next using an infected USB device is definitely not unheard of. Fortunately this method of malware propagation is relativity rare. Best wishes, Ritchie... Link to comment Share on other sites More sharing options...
soinvisage Posted June 7, 2017 Report Share Posted June 7, 2017 hello it will be good to have the possibility to add a folder in the quarantaine and submit it for analys , and the possibility to rescan this folder in the quarantaine thx a lot Link to comment Share on other sites More sharing options...
summitdeny Posted June 30, 2017 Report Share Posted June 30, 2017 should it work as a anti-phishing or anti-spyware program Link to comment Share on other sites More sharing options...
peterblaise Posted September 24, 2017 Report Share Posted September 24, 2017 . I'd LOVE to see ( from ANY program ): 1 - resizable windows ( we all have BIG screens now ) 2 - text report logs of each activity, dated and timed to they are unique and don't overwrite each other 3 - all lists searchable, sortable, selectable ( groups to be restored or deleted together in one action ), outputable to unique text report files 4 - quarantine simply adding .vir or .mal to the end of the original filename.ext or registry.reg dump in question 5 - options to restore, ignore once, ignore always, review and UNDO single actions, multiple actions, and entire scans ( restore EVERYTHING in quarantine ) 6 - NO dependence on external programs or external settings ( like security and script settings in Windows Internet Settings ) Thanks for considering these, even as user selectable options. __________ Using v6 2017-09 . Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.