Solved

How to identify an Antivirus software

Posted on 2006-10-22
2
251 Views
Last Modified: 2013-12-04
How can firewall of windows  identify a antivirus, which have either installed or not?. and further it can know that the antivirus is activating,too; this much, it base on which informations to decide this? I don't know, please help me.
0
Comment
Question by:k6t
2 Comments
 
LVL 14

Accepted Solution

by:
inbarasan earned 250 total points
ID: 17786662
Dear k6t,
Windows Firewall also may deduct in the same way using WMI as Windows Security centre. Here is info about the same.

Windows Security Center detects antivirus and firewall solutions through either a manual process or by querying the Windows Management Instrumentation (WMI) database. Regardless of the detection methodology used, the end-user experience is identical.

For users who have not been upgraded to a WMI-compliant solution, the manual approach ensures that they are still receiving valuable security information. The manual approach was designed to identify legacy versions of leading antivirus and firewall software programs. Windows Security Center will attempt to identify these installations by analyzing the system registry, system files, and system services.


Refer to : http://www.microsoft.com/windowsxp/sp2/wscoverview.mspx

Cheers!
Inba
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17789405
Any program can attempt to identify others by use of anti-virus techniques, basically looking at a specific string as an indicator identifying a specific program.

> can firewall of windows...know that the antivirus is activating

I am unaware of firewalls actually doing that, and similarly, am unaware of any A/V products going around detecting each other, even though it very often causes problems when more than one A/V is run at a time.

OTOH, some of the remote management products will search out for prior versions and other competitor products.
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now