Jump to content

Recommended Posts

Posted (edited)

If I turn off working memory in startup scan, what will not be detected?
For example, fileless malware, powershell scripting, DLL injection, etc.

setting.jpg.1b891ed049092379e20c30452bfb

Edited by rockman61
  • Administrators
Posted

Operating memory won't be scanned so any malware in memory won't be detected, only in other objects that are scanned.

Posted

Thank you for reply.
Let me clarify.
You mean that these can not be detect. it is correct?
・fileless malware
・Powershell scripting
・DLL injection

  • Administrators
Posted

ESET can detect any kind of malware either on pre-execution or post-execution, e.g. via the registry scanner, Advanced memory scanner, script scanner, Deep Behavior Inspection, etc.

Posted (edited)

I'm sorry, I didn't communicate well.
I understand that any malware in memory won't be detected when I turn off the operating memory in startup scan.

However, I would like to know more about the effect of turning off the operating memory in startup scan.
For example, ESET can not detect suspicious Powershell Scripting when turning off the operating memory in startup scan.

Please tell me more about the effect of turning off the operating memory.

Edited by rockman61
  • Administrators
Posted

Probably it depends on a particular malware how it works. However, with other pre and post-execution protection modules enabled it's unlikely that malware would be running in memory. Still, we don't recommend disabling memory scanning. It should be quick and virtually unnoticeable.

Posted (edited)

Examples of malware Eset can detect during the startup memory scan are MBR and UEFI based malware. Whereas these might be detected and execution blocked by Eset, they must be manually removed.

Edited by itman
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...