Exploit Prevention

The Exploit Prevention component allows you to block malicious programs that use vulnerabilities of well-known applications. To determine whether an object is malicious, the component uses also the data from Dr.Web cloud service.

To enable or disable Exploit Prevention

1.Open Dr.Web menu Dr.Web icon, then select Security Center.

2.In the open window, click Preventive Protection tile.

3.Enable or disable the Exploit Prevention component by using the switcher .

Note

Depending on settings of your provider, the switcher can enable or disable all the components of Preventive Protection at the same time.

 

Figure 67. Enabling/Disabling the Exploit Prevention component

To open Exploit Prevention parameters

1.Make sure Dr.Web operates in administrator mode (the lock at the bottom of the program window is open ). Otherwise, click the lock .

2.Click the Exploit Prevention tile. A component parameter window opens.

Note

The component parameters can be adjusted if the provider enables this option.

 

Possibility to manage settings for different users can be disabled by your provider. In this case, all specified parameters are applied to all the users of the computer.

In the window of component parameters, from the corresponding drop-down list, select the required level of protection against exploits.

Figure 68. Selecting protection level

Protection levels

Protection level

Description

Prevent unauthorized code from being executed

If an attempt of a malicious object to exploit software vulnerabilities in order to get access to critical regions of the operating system is detected, it will be blocked automatically.

Interactive mode

If an attempt of a malicious object to exploit software vulnerabilities in order to get access to critical regions of the operating system is detected, Dr.Web will display an appropriate message. Read the information and select a suitable action.

Allow unauthorized code to be executed

If an attempt of a malicious object to exploit software vulnerabilities in order to get access to critical regions of the operating system is detected, it will be allowed automatically.

Receiving notifications

If necessary, you can configure desktop and email notifications on Exploit Prevention actions.

See also:

Notifications