Hi,
Yes it's more than the application names and is identity based from what I can tell. I had a look at SAV32CLI and with the power of strings.exe from Sysinternals manged to find the switch: -controlled
will scan the directory "C:\Program Files (x86)\Windows Media Player" for controlled applications.
In this case it reports:
>>> Virus 'AppC/WMPlay-Gen' found in file C:\Program Files (x86)\Windows Media Player\wmplayer.exe
Which tells me it's all using the same technology under the hood which is good as it should be thorough.
For the short term (hopefully before it gets added on a monthly release cycle), if you have AD, you can always set up a GPO software restriction policy to disable for example someone running a process name "msnmsgr.exe". If this is considered to open to file name classhes you could include the whole path: for example: "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe". Maybe this would work for you, even if it was only linked to a few OUs.
Jak
Hi,
Yes it's more than the application names and is identity based from what I can tell. I had a look at SAV32CLI and with the power of strings.exe from Sysinternals manged to find the switch: -controlled
will scan the directory "C:\Program Files (x86)\Windows Media Player" for controlled applications.
In this case it reports:
>>> Virus 'AppC/WMPlay-Gen' found in file C:\Program Files (x86)\Windows Media Player\wmplayer.exe
Which tells me it's all using the same technology under the hood which is good as it should be thorough.
For the short term (hopefully before it gets added on a monthly release cycle), if you have AD, you can always set up a GPO software restriction policy to disable for example someone running a process name "msnmsgr.exe". If this is considered to open to file name classhes you could include the whole path: for example: "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe". Maybe this would work for you, even if it was only linked to a few OUs.
Jak