Rule type
|
Description
|
Anti-virus
|
These preconfigured rules protect your computer
from common behaviors of malware threats. You can enable, disable, and change
the configuration, but you cannot delete these rules.
Two rule examples are:
- Prevent
disabling or changing of critical processes, remote creation or modification of
executable files, hijacking of executable files, Windows Process spoofing, and
mass mailing worms from sending mail.
- Protect phone book files
from password and email stealers.
These protection levels apply to anti-virus rules:
- Standard
Protection
- Maximum
Protection
- Outbreak
Control
|
Common
|
These preconfigured rules prevent modification of
commonly used files and settings. You can enable, disable, and change the
configuration, but you cannot delete these rules.
Three rule examples are:
- Prevent
modification of
McAfee files and settings.
- Protect
Mozilla and Firefox files and settings, Internet Explorer settings, and network
settings.
- Prevent
installation of Browser Helper Objects and automatically running programs from
the Temp folder.
These protection
levels apply to the common rules:
- Standard
Protection
- Maximum
Protection
|
Virtual Machine
Protection
|
These preconfigured rules prevent termination
of VMWare processes and modification of VMWare files. You can enable, disable,
and change the configuration, but you cannot delete these rules.
Rule examples are:
- Prevent
termination of VMWAre Processes.
- Prevent
modification of VMWare workstation, server, or virtual machine files.
|
User-defined
|
These custom rules supplement the protection
provided by the
Anti-virus and
Common rules.
|
Anti-spyware
|
|
|