DeepGuard provides extra security layers with both behavior-based and access control protection.
It monitors applications to detect potentially harmful changes to the system.
Note: We strongly recommend that you keep DeepGuard on, because it provides critical protection, for example, against ransomware.
When DeepGuard is on, the following protections are on:
- Exploit protection
- Ransomware protection
- Heuristic analysis
- Behavior monitoring
To set up DeepGuard:
- Turn on DeepGuard:
- Under Profiles, select the used profile.
- Open Real-Time Scanning.
- Turn DeepGuard on.
Note: Make sure that Real-time scanning is on.
- You can add rules to exclude applications from DeepGuard scanning as follows:
Note: We recommend that you only exclude applications when absolutely necessary, because DeepGuard provides critical protection, for example against ransomware.
- In the Enabled column, turn the rule on.
- In the Application SHA-1 column, use the SHA-1 hash to identify the application. You can use an SHA-1 calculator to generate a 40-character SHA-1 hash.
- In the Notes column, store the name of the application or other identifying information. The field is not visible to end-users.
- In the Trusted column, select how DeepGuard handles the application. When you turn it on, DeepGuard allows all operations for this application; when you turn it off, DeepGuard always prevents this application from running.
Note: When an application is upgraded, you need to calculate a new hash for it.
- Select Done.