AV-Comparatives: Business Security Test March-April 2022 – Factsheet

Discussion in 'other anti-virus software' started by Minimalist, May 17, 2022.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  2. Trooper

    Trooper Registered Member

    Joined:
    Jan 26, 2005
    Posts:
    5,508
    Thanks for posting this. Not digging the fp's by CrowdStrike. ESET and MS looking pretty good though.
     
  3. imdb

    imdb Registered Member

    Joined:
    Nov 2, 2011
    Posts:
    4,208
    thanks, mini. :thumb:
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Interesting test, but it's not clear to me what the difference is between Real World Protection and Malware Protection? It almost seems like the first is about the ability to block malicious URL's, who cares about this? And when it comes to malware protection they used 1007 samples, so why not report how many of them were missed?
     
  5. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    Thanks mini. Boy, business AVs sure is a crowded field! BTW - I'm pleased that Avast did well (I use AVG, Avast's twin sister).
     
  6. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
    https://www.av-comparatives.org/real-world-protection-test-methodology/
    https://www.av-comparatives.org/tests/malware-protection-test-march-2018/
    In summary,
     
  7. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    GDATA. Yes.
    "If a product does not prevent or reverse all the changes made by a particular malware sample within a given time period, that test case is considered to be a miss"
    What's that "given time period", 1min? 5min?

    Reverse all the changes
    - what's "all the changes" in here? Registry, appdata etc locations? There's always be a remnants of the non-active malware(s), how this is measured?
     
  8. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
    https://www.av-comparatives.org/real-world-protection-test-methodology/
     
  9. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    If it's a cloud based detection aka BB offline test.
    On my own malware test(s), GData does an online (cloud lookup), then it does an offline behavior blocks with its Deepray. Worked really on my own offline BB testing procedure.
    Its not perfect tho, i mean GData BB, when i ran magber ransomware, which uses simple vssadmin to encrypt files, files where encrypted. Oh no. 12 hours after, the BEAST killed it.
     
  10. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Thanks, it's now more clear and I guess I was right, the first test is more about blocking malicious URL's, but browsers can als do this. I'm only interested in the ability to block malware from running once they get downloaded on the system by user or exploit. So in my view the Real World Protection test isn't needed.
     
  11. IBK

    IBK AV Expert

    Joined:
    Dec 22, 2003
    Posts:
    1,886
    Location:
    Innsbruck (Austria)
    from the introduction which can be found in the real-world protection test reports:
    "In this test, all protection features of the product can be used to prevent infection – not just signatures or heuristic file scanning. A suite can step in at any stage of the process – accessing the URL, downloading the file, formation of the file on the local hard drive, file access and file execution – to protect the PC. This means that the test achieves the most realistic way of determining how well the security product protects the PC. Because all of a suite’s components can be used to protect the PC, it is possible for a product to score well in the test by having e.g. very good behavioral protection, but a weak URL blocker. However, we would recommend that all parts of a product should be as effective as possible. It should be borne in mind that not all malware enters computer systems via the Internet, and that e.g. a URL blocker is ineffective against malware introduced to a PC via a USB flash drive or over the local area network."

    @Rasheed187: I think in your case you are more interested in the malware protection test, which does not consider the URL vector.
     
  12. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Thanks for the extra info. However, now that I think of it, then what do they mean with ''compromised''? I mean who cares about how malware ends up on the system, the only job of AV's is to block the malware from running both pre on post execution. So did these AV's fail to block malicious URL's or fail to block the malware from running?
     
  13. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Are you still there? What about my latest question? Seriously, why do these malware tests have to suck so hard? Just make it more clear if they failed to block malware from running or failed to block malicious URLs from running. But then the next question is, who cares about malicious URLs as long as they eventually blocked malware from running?
     
  14. Bunkhouse Buck

    Bunkhouse Buck Registered Member

    Joined:
    May 29, 2007
    Posts:
    1,286
    Location:
    Las Vegas
    Paranoia is good for sales of AV products. You are right: If the malware can't run, it can't hurt you. And, my go to defense is a daily image backup. I really don't care that much (anymore) about all of it.
     
  15. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    '<SYSTEM32>\cmd.exe' /C netsh advfirewall firewall delete rule name=all program=<Full path to file>
    '<SYSTEM32>\netsh.exe' advfirewall firewall delete rule name=all program=<Full path to file>
    '<SYSTEM32>\cmd.exe' /C netsh advfirewall firewall delete rule name=all localport=1688
    '<SYSTEM32>\netsh.exe' advfirewall firewall delete rule name=all localport=1688
    '<SYSTEM32>\cmd.exe' /C netsh advfirewall firewall add rule name=AutoKMS dir=in program=<Full path to file> localport=1688 protocol=TCP action=allow remoteip=any
    '<SYSTEM32>\cmd.exe' /C netsh advfirewall firewall add rule name=AutoKMS dir=out program=<Full path to file> localport=1688 protocol=TCP action=allow remoteip=any
    '<SYSTEM32>\cmd.exe' /C netsh advfirewall firewall delete rule name=AutoKMS
    '<SYSTEM32>\netsh.exe' advfirewall firewall delete rule name=AutoKMS
     
  16. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    Thats why im using, third party firewall....
     
  17. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    8,645
    Location:
    USA
    I feel about the same at this point.
     
  18. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Well, I don't really care about paranoia, but why do these tests have to be so complex, you know what I mean? Just make it clear how many malware samples each AV failed to protect against, without all of this mumbo jumbo.
     
  19. Bunkhouse Buck

    Bunkhouse Buck Registered Member

    Joined:
    May 29, 2007
    Posts:
    1,286
    Location:
    Las Vegas
    Complexity makes it appear more thorough to some- but of course we just need to know the basics as you stated. What blocked and what didn't? Its really very simple.
     
  20. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Yes exactly, this is my point. Looks like these professional AV testers haven't heard from the phrase: keep it simple stupid.
     
  21. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    I do like to see some BB tests, some sort of it. Online (no cloud lookup) and offline BB test. I know, it's really difficult to do BB test, because many BB works differently. Some security software BBs are more towards to HIPS like, and some can analyze malicious behavior more deeply and if possible can revert the damage done by the malware(s). Some Security Softwares and their BB component does the online lookup, but while doing so, the mighty malware is running (encrypting) your file in the background and after the "cloud lookup" the verdict "this is a malware". But all the files meanwhile are encrypted. Sure it stops the processes, but its too late.
    Yes, GNU is not Unix and BB is not HIPS :D
     
  22. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Perhaps you should post the result or your testing, or make a video on YouTube? I have been watching a couple of ''amateur'' malware testing videos on YouTube and it was kinda shocking to see how many AV's fail to protect against ransomware. That's why I decided to add NeuShield to my setup, which is of course also not bulletproof.
     
  23. moredhelfinland

    moredhelfinland Registered Member

    Joined:
    Mar 31, 2009
    Posts:
    350
    Location:
    Finland
    But its difficult to test, because some softwares relies on cloud lookup and others are more hips based ones.
    Sure i can do the test with several "different" malwares. And only BB component activated(if awailable). Offline or Online test. Something like Formfook variants vs offline BB.
    Interesting enough, trialling K7 AV, and it works quite good against newest bazaar samples, so far.

    As for the best what i've tested is McAfee Endpoint and its Dynamic Application Control aka "Sandbox" of it with it's RealProtect BB is the best i've ever used. By default it's home version of McAfee.
    Its so damn heavy on the system. I disabled all but its DAC and its Realprotect (GTI sense high), and with bazaar samples i throw against, i caught them all. Suspect! etc.
    So my opinion, the best it McAfee DAC(sandbox)/RealProtect COMPONENT.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.