Trojans are commonly used by attackers to trick people into installing some form of malicious payload which could be in the form of a rootkits that allows backdoor system access.
- [Instructor] We've covered spyware…and adware as malware types.…In this video, we're going to continue…by talking about viruses, trojans and rootkits.…Viruses, trojans and rootkits…are all different of malware in terms of how they behave,…and we're going to cover those behaviors…to distinguish one from the other.…But one thing they do share in common…is that they are all installed without user consent.…Pictured on the screen we can see what's happening…inside the System Center Endpoint Protection client,…where it's detected that we've got some malware.…
We've got some monitoring tools and some hack tools…that were detected and stopped…by System Center Endpoint Protection.…Let's start by going into the details of a virus.…When we talk about a virus as malware,…we're talking about software…that can attach itself to a host file.…And it can also be application specific,…for example, a macro virus…for an office productivity component.…Now viruses have various triggers…that determine when they fire off.…
Some of these virus triggers include a schedule,…
- Malware types
- Getting Endpoint Protection up and running
- Deploying the SCEP Windows client
- Removing malware on a SCEP client
- Configuring custom policies
- Planning an update strategy
- Windows firewall settings
- Using PowerShell cmdlets for monitoring
Skill Level Beginner
1. Defining Malware Types
2 Getting Endpoint Protection Up and Running
3. Endpoint Protection Policies
4. Monitoring Endpoint Protection
Next steps1m 11s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.