Key features of CylancePROTECT Desktop
CylancePROTECT Desktop
Feature | Description |
---|---|
Detect and quarantine malicious files | CylancePROTECT Desktop provides options for handling files that it detects as either unsafe or abnormal. You can add files identified in threat events to a quarantine list or a safe list for handling future events. |
Protect against memory exploits | CylancePROTECT Desktop provides options for handling memory exploits, including process injections and escalations. You can also add executable files to an exclusion list, allowing these files to run when a device policy is applied. |
Block malicious scripts | CylancePROTECT Desktop monitors and protects against malicious scripts running in your environment. The CylancePROTECT Desktop agent is able to detect the script and script path before the script is executed and block it. |
Block threats from USB storage devices | CylancePROTECT Desktop controls how USB mass storage devices can connect to devices in your organization. You can allow or block USB mass storage devices, including USB flash drives, external hard drives, and smartphones. |
Receive immediate alerts | CylancePROTECT Desktop monitors the execution of malicious processes and alerts you when anything unsafe or abnormal attempts to run. |
Detect inactive devices | If the CylancePROTECT Desktop agent has been out of contact for a specified period of time, the device state changes to inactive. You can review inactive devices to determine if they should be removed from the management console. |
Protect virtual machines | CylancePROTECT Desktop is not as resource intensive on a per-guest basis because the technology does not require daily disk scans. CylancePROTECT Desktop is also not as memory intensive on a per-guest basis. |