> Security Manager > Security Manager Modules > Behavioral Analysis Module

Behavioral Analysis Module

The Behavioral Analysis module includes the following groups of settings:

  • Behavioral Analysis
  • Active Virus Control
  • Intrusion Detection (IDS) - laptop/workstation profiles only.

The Behavioral Analysis module is not supported on devices running Windows XP (64-bit) or Windows Server 2003. It is supported on devices running 32-bit and 64-bit editions of:

  • Windows XP (32-bit only)
  • Windows Vista
  • Windows 7
  • Windows 8
  • Windows 8.1
  • Windows 10
  1. In the navigation pane, click Configuration > Security Manager > Profiles
  2. Click Add, or click on an existing profile to edit.
  3. Click View Settings beside the Behavioral Analysis module.

Behavioral Analysis Module Settings

Setting Description

Behavioral Analysis

Enables and installs the module to perform automatic security functions.

Turn off Silent Mode to enable the user to select to block or allow events. If no response is provided, the events are blocked.

Active Virus Control

Enables or disables Active Virus Control, so that AV Defender can monitor applications and scan for malware-like actions on the target system.

You set the detection level to determine the aggressiveness of this behavioral detection engine. Place your cursor over the icon to view a description of what impact these settings have on Active Virus Control.

Set the Detection Level to normal to protect best against cryptolocker and its variants.

Intrusion Detection System (IDS)

Configure the Intrusion Detection System (IDS) to monitor the network and system activities for malicious activities or policy violations. IDS detects and blocks attempts to change:

  • critical system files,
  • AV Defender files or registry entries,
  • installation of malware drivers, and
  • attacks performed by code injection (DLL injection).

Set the detection level to determine the aggressiveness of this behavioral detection engine. Place your cursor over the icon to view the detailed description of what impact these settings have on the Intrusion Detection System.