Each type of threat is handled by a dedicated application component. You can enable, disable and configure application components irrespective of each other.
The following application components are protection components:
File Anti-Virus. This component prevents infection of the file system of the protected virtual machine's operating system. The component starts together with the application, continuously remains active in computer memory, and scans all files that are opened, saved, or started in the operating system of the protected virtual machine. File Anti-Virus intercepts every attempt to access a file and scans the file for viruses and other malicious programs.
Mail Anti-Virus. This component scans incoming and outgoing email messages for viruses and other malware.
Web Anti-Virus. This component scans inbound HTTP and FTP traffic of the protected virtual machine and checks links against lists of malicious and phishing web addresses.
Firewall. This component protects personal data that is stored in the operating system of the protected virtual machine and blocks all kinds of threats to the operating system while the protected virtual machine is connected to the Internet or to a local area network. The component filters all network activity according to two types of rules: network rules for applications and network packet rules.
Network Attack Blocker. This component inspects inbound network traffic for activity that is typical of network attacks. On detecting an attempted network attack that targets the protected virtual machine, the application blocks network activity originating from the attacking computer.
System Watcher. This component receives information about application activity in the operating system of the protected virtual machine and provides this information to other components for more effective protection.
The following application components are control components:
Application Startup Control. This component keeps track of user attempts to start applications and regulates the startup of applications.
Application Privilege Control. This component logs the activity of applications in the operating system that is installed on the protected virtual machine, and regulates application activity depending on the trust group the component assigns them to. A set of rules is specified for each group of applications. These rules regulate applications’ access to personal data and operating system resources. Personal user data includes user files (the My Documents folder, cookies, user activity information) and files, folders, and registry keys that contain operation settings and important data for the most frequently used applications.
Device Control. This component lets you set flexible restrictions on access to devices that are sources of information (for example, hard drives, removable drives, CD/DVD), tools for transferring information (for example, modems) or for converting information to hard copy (for example, printers), or interfaces used by devices to connect to the protected virtual machine (for example, USB, Bluetooth).
Web Control. This component lets you set flexible restrictions on access to web resources for different user groups.
Integrity Monitoring. The component can track changes in the operating system installed on the protected virtual machine.
The operation of control components is based on the following rules: