CLEANACCESS Archives

September 2004

CLEANACCESS@LISTSERV.MIAMIOH.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Hague, Jeff" <[log in to unmask]>
Reply To:
Perfigo SecureSmart and CleanMachines Discussion List <[log in to unmask]>
Date:
Wed, 1 Sep 2004 11:57:44 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (13 lines)
Is anyone using the registry key and/or file existence features of
SmartEnforcer to look for signatures of common viruses and other
malware? Some of them seem pretty predictable in as far as their
registry entries or files dropped.
If so, how is it working out for you? What action do you take when there
is a "hit"?
Thanks!

Jeff Hague
Network Manager
Randolph-Macon College
Ashland, VA

ATOM RSS1 RSS2