Follow the steps in this guide to avoid the most common installation issues when installing an CYSECA application on your Windows PC, and to get optimum performance from your new CYSECA application.
Refer to the relevant section below according to your CYSECA product:
Allow use of selected files based on certain criteria set as policy.
Traditional anti-malware solution that adopts Blacklist approach, are becoming inadequate in facing growing targeted cyber-attacks.
Critical systems are increasingly being targeted resulting in data leakage, locked folders with ransom note, loss of valuable data, use of compromised endpoints as launching pad for malicious activities and more.
Designed to prevent execution of unauthorized application, unknown application, and malware and zero-day malware. It is also to create awareness about cybersecurity to public
Ensure that you are connected to the internet for license activation and updating the whitelisting rules.
.msi
and run as Administrator. XXXX-XXXX-XXXX-XXXX-XXXX
" that has been sent to your registered email after registration. There are three (3) types of protection mode which has different function and security.
Monitor what the user executes, and the executed application will be listed. In this mode, all application will be allowed. The user can also add the executed application during audit mode into a new custom application.
The user decide which application can be run on the pc. User will be redirected to the rules page if the option is selected. The application in the rules page is fetched from CYSECA Server.
Automatically allow applications that has been deemed safe to run on user computer.
The highlighted text box above reminds user that in audit mode, execution of files will be recorded, and the user can manually decide whether to add or not the files recorded in custom application rules.
For this scenario, TeraCopy was used as unknown file to be added into custom rule. When the user clicks on Process button on the right of the user interface, the above menu will appear.
.csv
format. Saved rules from audit mode will also appear here. On the application control menu, user can manage application rules, manage custom rules, and manage exclusion list.
.vbs
, .py
, and .ps1
will be shown in file execution logs. Fileless threat is a type of threat that does not come in form of file, instead, it uses memory to store its command. Fileless can come in three (3) types, which are:
A fully fileless malware can be considered one that never requires writing a file on the disk. A compromised device may also have malicious code hiding in device firmware (such as a BIOS), a USB peripheral (like the BadUSB attack), or in the firmware of a network card. All these examples do not require a file on the disk to run and can theoretically live only in memory. The malicious code would survive reboots, disk reformats, and OS reinstalls. Infections of this type can be particularly difficult to detect because most antivirus products do not have the capability to inspect firmware. In cases where a product does have the ability to inspect and detect malicious firmware, there are still significant challenges associated with remediation of threats at this level. This type of fileless malware requires high levels of sophistication and often depends on hardware or software configuration. It is not an attack vector that can be exploited easily and reliably. While dangerous, threats of this type are uncommon and not practical for most attacks.
There are other ways that malware can achieve fileless presence on a machine without requiring significant engineering effort. Fileless malware of this type does not directly write files on the file system, but they can end up using files indirectly. This can be considered as common attack type, which is the attacker uses legitimate command/scripts which were whitelisted by windows, such as Powershell
, mshta
, regsvr32
and wscript/script
.
Some malwares can have a sort of fileless persistence, but not without using files to operate. This type of attack will set certain verb/keyword which will be invoked by the script to open malicious command through legitimate Windows Shell command, such as mshta
or wscript
.
In this part, the functionality of the settings are being explained.
Settings menu(*.jar)
Please check your PC and ensure it meets the minimum requirements to install.
Please check your license key sent to your registered email. If you accidentally delete the email, you can retrieve it by Login here.
Please check your license key sent to your registered email. If you accidentally delete the email, you can retrieve it by Login here.
If you are still unable to activate the license, contact CYSECA Support to further assistance.
For details explanation, you can download the guide here or you can directly contact our Support.
Subscribe to our forum to share your thoughts or find solutions needed.