3 results found
This is a very common use case for a lot of users. The actions that users take however varies quite a bit based on their own requirements. Some people configure firewall rules, some run removal tools, some shut-down the PC etc, in almost all cases and email is sent. For us to provide this configuration and necessary filters out -of-the-box would require a significant investment in continued research of crypto malware in order to keep monitoring effective.
That being said, we may still pursue this because when configured correctly, Directory Monitor is very effective as an early detection system for crypto viruses and has already been successful in numerous live installations. With enough support for this idea we may take this on.
8 votesAnonymous supported this idea ·