Rule type
|
Description
|
Anti-virus
|
These preconfigured rules protect your computer from
common behaviors of malware threats. You can enable, disable, and change the
configuration, but you cannot delete these rules.
Two rule examples are:
- Prevent
disabling or changing of critical processes, remote creation or modification of
executable files, hijacking of executable files, Windows Process spoofing, and
mass mailing worms from sending mail.
- Protect phone
book files from password and email stealers.
These protection levels apply to anti-virus rules:
- Standard
Protection
- Maximum
Protection
- Outbreak
Control
|
Common
|
These preconfigured rules prevent modification of commonly
used files and settings. You can enable, disable, and change the configuration,
but you cannot delete these rules.
Three rule examples are:
- Prevent
modification of
McAfee files and settings.
- Protect
Mozilla and Firefox files and settings, Internet Explorer settings, and network
settings.
- Prevent
installation of Browser Helper Objects and automatically running programs from
the Temp folder.
These protection levels apply to the common rules:
- Standard
Protection
- Maximum
Protection
|
Virtual Machine
Protection
|
These preconfigured rules prevent termination of VMWare
processes and modification of VMWare files. You can enable, disable, and change
the configuration, but you cannot delete these rules.
Rule examples are:
- Prevent
termination of VMWare Processes.
- Prevent
modification of VMWare workstation, server, or virtual machine files.
|
User-defined
|
These custom rules supplement the protection provided by
the
Anti-virus and
Common rules.
|
Anti-spyware
|
Rule examples are:
- Prevent
Internet Explorer favorites and settings.
- Prevent
programs from running and execution of scripts from the Temp folder.
|
|