
Proactive Defense
119
To add to the trusted module list, click
Add
and in the standard file selection
window, and select the module.
Figure 39. Configuring the trusted module list
10.3.
Registry Guard
One of the goals of many malicious programs is to edit the Microsoft Windows
system registry on your computer. These can either be harmless jokes, or more
dangerous malware that presents a serious threat to your computer.
For example, malicious programs can copy their information to the registry key
that makes applications open automatically on startup. Malicious programs will
then automatically be started when the operating system boots up.
The special Proactive Defense module traces modifications of system registry
objects. You can turn this module on or off by checking the box
Enable Regi-
stry Guard
.
To configure system registry monitoring:
1. Open the application settings window and select
Proactive Defense
under
Protection
.