220.127.116.11 Addendum – FolderWatch/HoneyPot Definitions WARNING: These settings are designed and should be used for advanced users only or as directed by Foolish IT support staff. Misuse of these setting can severely impact the performance and ability of both FolderWatch and the HoneyPot Detection Protection features in CryptoPrevent. Use these options at your own risk […]
18.104.22.168 Addendum – Proxy Settings Enable Proxy Settings Enables proxy settings defined for update/download operations Proxy Server Address (domain or IP only) Port Username Password Socks 5 Proxy enable/disable Use the same proxy settings for email Enable or disable using the same proxy settings defined for updates for sending emails as well Enable Proxy Settings […]
Command Line Parameters (Premium Only Feature): /undo Remove protections but leave whitelists /undoall Remove protections and all whitelists /l=# Set a specific plan level set of protections Note: l is a lowercase L #=0 for None Protection Plan =1 for Minimal Protection Plan =2 for Default Protection Plan =3 for Maximum Protection Plan =5 for […]
Applying Protections (Plan or customized selected) Once you have confirmed all your desired settings at this point, click the Apply Protection Plan Depending on the policy and number of protections selected, it may take several minutes to apply protections. You may also be prompted to whitelist all executables located in locations that will be blocked. […]
About tab: This tab displays information about CryptoPrevent including its history, evolution, and honorable mentions.
Updates tab: Enable a daily update schedule runs at the hour of your choosing or at a randomly picked time. A button is provided for manually checking for updates. (made available if enable daily update schedule checkbox fails) Additional hash definitions will be downloaded from our servers if the Extended Hash Definitions option is checked. […]
History tab: The History tab logs information about CryptoPrevent activity either since: the Previous Startup for as far back as the Windows event logs happen to record. Events will be created whenever either a software restriction policy is enforced or when either our program filter module or FolderWatch protection detects malicious software or activity. The […]
Email Settings tab: This tab is used to enable email notifications of alerts. Alerts will be emailed using the provided credentials and options. (Settings entered here are only available to the local system, this information is not transmitted or used by Foolish IT in any way) Settings are predefined for Google’s Gmail service or you […]
Submit New Hash tab: If you identify a file you know to be malicious, you may use this tab to select that file, compute its hashes, and potentially upload it to Foolish IT for further analysis and potential inclusion in future base definitions. After browsing for a file, its hashes will be computed and compared […]
User Hash Definitions tab: Similar to the whitelist and blacklist software restriction policies, our hash definitions also utilize lists to either allow or block a specific hash definitions, respectively. Hashes are only used with the Filter Module and FolderWatch protections The blacklist will only contain custom hashes and does not expose the hashes distributed with […]
Join us for live tech chat, product questions, support, and technical training right here!
Customer or not, you are welcome to drop in and discuss anything ‘tech’ with us!
d7x Quick Tip – Automating the d7xRDT d7x Quick Tip – Automating the d7xRDT with d7x v19.6.18