In the Exploit prevention section, you can configure the blocking of malicious programs that use vulnerabilities of applications. From the corresponding drop-down list, select the required level of protection.
Protection level
|
Description
|
Prevent unauthorized code from running
|
If an attempt of a malicious object to exploit software vulnerabilities to get access to critical regions of the operating system is detected, it will be blocked automatically.
|
Interactive mode
|
If an attempt of a malicious object to exploit software vulnerabilities to get access to critical regions of the operating system is detected, Dr.Web will display a corresponding message. Read the information and select a suitable action.
|
Allow unauthorized code to be executed
|
If an attempt of a malicious object to exploit software vulnerabilities in order to get access to critical regions of the operating system is detected, it will be allowed automatically.
|
|