Does WSA Essentials only scan on access with its cloud database? Under what circumstances will WSA scan a file or executable with its cloud database? I'm assuming WSA Essentials Identity Protection uses something similar to a behavior blocker from within the browser & also limits connections for a particular page, but WSA does not scan HTTP, HTTPS, FTP, SMTP, or POP3 protocols with its cloud database. Am i correct in my understanding of how WSA works. WSA does not scan HTTP, HTTPS, FTP, SMTP, or POP with its cloud AV. Is this correct? I'm trying to learn the fine mechanics of how WSA works so I can make an educated decission on which security products would best compliment WSA for my particular needs. I work with sensitive data, and need to make sure i'm covering all posible entry points that could be exploited. It would be great if I could obtain some detailed documentation or be advised by someone that is very knowledgable on the fine mechanics of WSA.
Thank You in advance!!
cutting_edgetech
Solved
What protocols does WSA Essentials scan?
Best answer by Kit
Much QA work to do on Mondays, but I've been asked to step in here and answer.
So the first thing that's critical is to define a certain set of stuff...
All of those protocols you list are, literally, just that: Transport protocols. All they do is move data from one place to another. The reason this is important to know is very simple: For a threat to do anything, it needs to make it onto the CPU. It literally needs to get into memory and have the execution pointer target it. Just getting onto the system via a transport protocol won't actually compromise the system. For example, I could send a threat at a computer by sending a UDP stream to its IP, but the computer would completely ignore it.
So, HTTP as a transport protocol for example would need to download the file, and then successfully execute it. Whether this involves tricking the user into running it or trying to use a Java exploit or Flash bug to run it, the execution is still the important part.
That means that looking at any protocol is completely unnecessary in the event that the CPU execution pointer itself is shielded. Everything you named is literally just a way to try to get file onto the computer, and running it has to happen afterwards. Since the running part is the critical part, and since that is checked when it tries to start to happen, it's blocked if it's a threat.
Then also, any file that is written is scanned. As well, any process that ends up with a code change of untrusted library injected into it will be monitored and scanned, so anything that completely fails to hit the disk will still be checked. And finally, the network scanning works on an endpoint basis, which is protocol-agnostic. Network connections are accounted for regardless of whether it is HTTP, SMTP, or even something like DNS Tunnelling.
That being said, the CONTENTS of network connections with the exception of HTTP are not inspected specifically because that puts an undue load on the system and slows things down for no good reason. Since the code has to get onto the system and run in order to do anything bad, and since we check it when it hits the file system or when it tries to run, checking it at the edge of the network would be redundant. Thus, one can say that we worry about all protocols and yet worry about none, because the way you appear to be thinking of it we don't look at, but we do look at it in a more thorough manner on both sides of the protocols themselves.
The main thing I'd recommend as the best supplement to safety is patching. Keep -all- software up to date and don't include unneeded network software on the system. Java, Flash Player, and Adobe Reader are major intrusion sources, as are things like Skype. Any unpatched program with a network facing or that can be invoked by a process with network facing is a security risk.
Hopefully that answers your question, but if I was not clear at any point or you have further questions, let me know.
View originalSo the first thing that's critical is to define a certain set of stuff...
All of those protocols you list are, literally, just that: Transport protocols. All they do is move data from one place to another. The reason this is important to know is very simple: For a threat to do anything, it needs to make it onto the CPU. It literally needs to get into memory and have the execution pointer target it. Just getting onto the system via a transport protocol won't actually compromise the system. For example, I could send a threat at a computer by sending a UDP stream to its IP, but the computer would completely ignore it.
So, HTTP as a transport protocol for example would need to download the file, and then successfully execute it. Whether this involves tricking the user into running it or trying to use a Java exploit or Flash bug to run it, the execution is still the important part.
That means that looking at any protocol is completely unnecessary in the event that the CPU execution pointer itself is shielded. Everything you named is literally just a way to try to get file onto the computer, and running it has to happen afterwards. Since the running part is the critical part, and since that is checked when it tries to start to happen, it's blocked if it's a threat.
Then also, any file that is written is scanned. As well, any process that ends up with a code change of untrusted library injected into it will be monitored and scanned, so anything that completely fails to hit the disk will still be checked. And finally, the network scanning works on an endpoint basis, which is protocol-agnostic. Network connections are accounted for regardless of whether it is HTTP, SMTP, or even something like DNS Tunnelling.
That being said, the CONTENTS of network connections with the exception of HTTP are not inspected specifically because that puts an undue load on the system and slows things down for no good reason. Since the code has to get onto the system and run in order to do anything bad, and since we check it when it hits the file system or when it tries to run, checking it at the edge of the network would be redundant. Thus, one can say that we worry about all protocols and yet worry about none, because the way you appear to be thinking of it we don't look at, but we do look at it in a more thorough manner on both sides of the protocols themselves.
The main thing I'd recommend as the best supplement to safety is patching. Keep -all- software up to date and don't include unneeded network software on the system. Java, Flash Player, and Adobe Reader are major intrusion sources, as are things like Skype. Any unpatched program with a network facing or that can be invoked by a process with network facing is a security risk.
Hopefully that answers your question, but if I was not clear at any point or you have further questions, let me know.
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.