Please be aware that this feature is not meant to detect modifications to any application in general. This is useful to avoid abusing rules configured for some application by another application by temporarily or permanently replacing the original application's executable file with the other applications executable file, or by maliciously modifying the original application's executable file. The application modification detection feature displays notifications if modified applications, for which a firewall rule exists, attempt to establish connections. So I assume you would have to be running in interactive mode initially or manually create rules for all apps you want monitored. ![]() ![]() The below is from the Endpoint user manual.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |