Is anyone using the registry key and/or file existence features of
SmartEnforcer to look for signatures of common viruses and other
malware? Some of them seem pretty predictable in as far as their
registry entries or files dropped.
If so, how is it working out for you? What action do you take when there
is a "hit"?
Thanks!
Jeff Hague
Network Manager
Randolph-Macon College
Ashland, VA