The latest ESET Inspect brings new features and improvements:
In the event of suspicious or malicious activity, Linux systems can be isolated from the internet, stopping data exfiltration or deeper breaches without disrupting essential ESET services.
Feature will become available after the release of ESET Server Security for Linux version 12.0 and ESET Endpoint Antivirus for Linux version 12.0.
|
•Collection of Volume Shadow Copy Delete event—A new AMSI-powered VolumeShadowCopyDeletion event collection for deeper visibility into shadow copy deletions, a favorite move by ransomware to prevent system recovery.
•SentBytes property of process is now available in Rules—You can now use the SentBytes property in the Rule Engine to create targeted detection rules for anomalous network behavior and potential data exfiltration. |
ESET Inspect's latest release improves quality with bug fixes for greater stability and performance enhancements for a smoother, more efficient user experience.
|