
Proactive Defense
123
The rule is created for any application by default. If you want the
rule to apply to a specific application, left-click on any and it will
change to this. Then click on the specify application name link. A
context menu will open: click
Browse
to see the standard file selec-
tion window, or click
Applications
to see a list of open applica-
tions, and select one of them as necessary.
Define the Proactive Defense response to the selected application
attempting to read, edit, or delete system registry files.
You can use any of these actions as a response: allow, prompt for
action, and block. Left-click on the link with the action until it reach-
es the value that you need.
Choose if you want to generate a report on the operation carried
out, by clicking on the log / do not log link.
Figure 42. Creating an registry key monitoring rule
You can create several rules, and order their priority using the
Move Up
and
Move Down
buttons. The higher the rule is on the list, the higher the priority as-
signed to it will be.