Skip Navigation

Key features of
CylancePROTECT Desktop

Feature
Description
Detect and quarantine malicious files
CylancePROTECT Desktop
provides options for handling files that it detects as either unsafe or abnormal. You can add files identified in threat events to a quarantine list or a safe list for handling future events.
Protect against memory exploits
CylancePROTECT Desktop
provides options for handling memory exploits, including process injections and escalations. You can also add executable files to an exclusion list, allowing these files to run when a device policy is applied.
Block malicious scripts
CylancePROTECT Desktop
monitors and protects against malicious scripts running in your environment. The
CylancePROTECT Desktop
agent is able to detect the script and script path before the script is executed and block it.
Block threats from USB storage devices
CylancePROTECT Desktop
controls how USB mass storage devices can connect to devices in your organization. You can allow or block USB mass storage devices, including USB flash drives, external hard drives, and smartphones.
Receive immediate alerts
CylancePROTECT Desktop
monitors the execution of malicious processes and alerts you when anything unsafe or abnormal attempts to run.
Detect inactive devices
If the
CylancePROTECT Desktop
agent has been out of contact for a specified period of time, the device state changes to inactive. You can review inactive devices to determine if they should be removed from the management console.
Protect virtual machines
CylancePROTECT Desktop
is not as resource intensive on a per-guest basis because the technology does not require daily disk scans.
CylancePROTECT Desktop
is also not as memory intensive on a per-guest basis.