Movatterモバイル変換


[0]ホーム

URL:


Classification Guide

How F-Secure classifies threats

F-Secure categorizes each application or file asClean,Potentially Unwanted Application,Unwanted Application orHarmful based on the risks it poses to your device or data.

An application suspected of being aPotentially Unwanted Application or anUnwanted Application may go through additional screening, which is detailed inClassifying Potentially Unwanted Applications.

CategoryDefinition

Clean

A Clean application does not pose a risk to your device or data.

A Clean application does not have traits or behavior that can be harmful to your device or data.

Example

A word processing application does not perform any actions that are harmful to your device or data.

How the product protects you

The application or file is allowed to run normally.

Potentially Unwanted Applications & Unwanted Applications

A Potentially Unwanted Application (PUA) has behaviors or aspects that can be considered undesirable or unwanted, depending on the user's context.

An Unwanted Application (UA) has a significant number of undesirable or unwanted behaviors or aspects.

A PUA / UA can perform actions that impact:

  • Productivity
  • The device's resources
  • Data security or privacy

A PUA / UA does not meet the strict technical definition ofmalware.

Example

PUA: :A network monitoring application may be considered useful to a system administrator using it to monitor an office workstation, but undesirable to the workstation user, whose security and privacy may be impacted.

UA: Anapplication bundle that leverages on the popularity of one application to entice users into installing a second included application, which serves aggressive or annoying ads.

How the product protects you

PUAA warning notification message is displayed before the application or file is allowed to run normally. You can also opt to have the F-Secure product block a PUA.

UA: The application or file is automatically blocked and quarantined. If you are certain you want to keep using the application or file, you can exclude it from further scanning by the product.

Harmful

A Harmful application or file poses a significant risk to your device or data.

A Harmful application or file can perform damaging actions, such as:

  • Stealing personal or system data
  • Secretly manipulating the device or installed applications
  • Completely blocking normal use of the device

Harmful applications or files meet the technical definition ofmalware.

Example

Aransomware silentlyencrypts files on the affected device to extort money from the user.

How the product protects you

The application or file isautomatically blocked and removed.

F-Secure examines every application or file and assigns it aType based on the actions it can perform. TheType is used to determine the application or file'sCategory.

TypeCategoryDescription
ApplicationPotentially Unwanted Application If misused, introduces a security risk. More >
AdwarePotentially Unwanted Application
Displays advertising material. More >
TrackwarePotentially Unwanted Application
Identifies a user or a device to a third party. More >
Hack-Tool
Potentially Unwanted Application
Bypasses safety or security mechanisms. More >
Monitoring-Tool
Potentially Unwanted Application
Monitors and records (some or all) user actions on the device. More >
SpywarePotentially Unwanted Application
Collects information about user actions or a device, and sends it out. More >
BackdoorHarmful Provides unauthorized access to, and control of, a device. More >
ExploitHarmful Takes advantage of a vulnerability to create unexpected conditions. More >
TrojanHarmful Performs a harmful action without the user's knowledge or consent. More >
RootkitHarmful Hides other applications or files on the device. More >
WormHarmful Spreads copies of itself to other devices over a network. More >
VirusHarmful Directly tampers with an application or file's code. More >

Applications or files that are categorized asPotentially Unwanted Applications (PUA),Unwanted Applications (UA) orHarmful are also assigned aPlatform, which indicates the operating system they need to be installed on, or the application they need to function.

PlatformDescription
AM Runs as a VBA macro in the Microsoft Access application (version 97 or later)
AndroidRuns on the Android mobile operating system
ACADUses the AutoCAD application
BAT Uses the DOS, Windows or NT command interpreter or clone (4DOS, 4NT)
Boot Uses or resides in the Master Boot Record (MBR) or DOS Boot Sector of an operating system
ChromeOSRuns on the Chrome operating system
CM Runs as a VBA macro in the Corel Draw! application (version 9.0 or later)
CS Uses the CorelScript interpreter found in many Corel products
DOS Uses COM, EXE (MZ) or SYS files on the DOS operating system and require some version of MS-DOS or clone
HLPRuns in the WinHelp application
HTMLRuns in a HTML document as a malicious iframe
IDAUses the IDA Pro application
INFUses Windows INF files
INIUses mIRC INI files
iPhoneOSRuns on the iPhone mobile operating system
MSILRuns on or uses the .NET framework
JavaUses or runs in the Java Runtime Enviroment
JSUses the Jscript or JavaScript interpreter
LinuxRuns on any Linux distribution
MacOSRuns on any Mac operating system prior to MacOS X
MMSUses Multimedia Messaging System (MMS) messages
OM Uses or runs in two or more applications in the Office 97 suite or later, including related products (Visio, Projects)
OS/2Runs on the OS/2 operating system
OSXRuns on the MacOS X operating system
PM Runs as a VBS macro in Microsoft Project (version 98 or later)
PalmOSRuns on the Palm operating system
PerlUses a Perl interpreter
PHPUses or runs as a PHP script
PPM Runs as a VBS macro in Microsoft PowerPoint (version 97 or later)
PUM Runs as a VBS macro in Microsoft Publisher (version 97 or later)
REGUses the Windows Registry file format
SHUses a Unix(-like) shell script interpreter
SMSUses Short Messaging System (SMS) messages
SolarisRuns on the Solaris operating system
SymbOSRuns on the Symbian operating system
SVLRuns in or uses Microsoft Silverlight
SWFRuns in or uses Macromedia Flash
UnixRuns on Unix or uses ELF files
VBSUses the Visual Basic Script interpreter
W16Runs on the 16-bit Windows operating system
W32Runs on the 32-bit Windows operating system
W64Runs on the 64-bit Windows operating system
W128Runs on the 128-bit Windows operating system
WM Runs as a VBA macro in Microsoft Word (version 97 or later)
WinCE Runs on the PocketPC (Windows CE) operating system
WinHEXUses WinHex
WMA Runs as a Windows media Audio file (usually disguised as mp3)
WMV Runs as a Windows media Video file (usually disguised as avi)
XM Runs as a VBA macro in Microsoft Excel (version 97 or later)


[8]ページ先頭

©2009-2025 Movatter.jp