We hate to say it, but sometimes standard programs like Microsoft Word or Office are the weakest link. They can be weaponized against you, allowing for an open backdoor to your files and sensitive data. HitmanPro.Alert adds additional security layers around these vulnerable programs and replaces infected Windows resources with safe, original versions.
In the meantime, please review this article as it covers all the Sophos Components and their names.
As for the uninstall, Tamper protection exists to avoid unauthorized users and certain types of malware from uninstalling Sophos or disabling its components. Please see the FAQ for more information.
If you ever need to recover a system with tamper protection (that cannot be disabled in the conventional ways), we do have a way for that as well: Sophos Endpoint Defense: How to recover a tamper protected system
3) That comfort can be achieved by simply disabling tamper protection. That same comfort (disabling tamper protection) also opens door for some malwares to disable AV and do bad stuff afterwards There's a reason that this (in earlier times not avaiable) tamper protection feature got demanded for years by enterprise and higly security affine cutomers. If it's hard to tamper Sophos AV with tamper protection on, I'd take this as credit to the devs, that they implemented it right.
I can understand the frustration with software branding, as an IT professional you can waster a lot of time navigating in the in's and out's of how a new software package works, why are things not done in a more organized fashion to make our jobs a little easier.
For example this should never happen in the first place, when vetting software any software, there is not a college in the world for IT administration the does not teach to test software and or any changes prior to putting those changes into a production environment. IT admins should be installing the software on a new test system with known services and applications and compare the changes after the software is installed, this should be done before it is even purchased. Sophos offers a free 30 day trial so no one should really be surprised after the fact about anything.
Which is, the re-branding aspect might not be possible based on the purchase agreement Sophos may have with Hitman Pro. That agreement may also be renewed every few years with the intention to re-brand but Hitman Pro might not want that and it could be a deal breaker in the negation.
I stumbled on to this thread after about 5 minutes of discovering hitmanpro processes running on my system after recently installing Sophos Endpoint as a trial to research it as a solution to replace Symantec Endpoint. I say that because any IT professional should take about that long to figure it out after seeing the directories created at the same time as the Sophos directories that the hitmanpro processes reside in. Then a simple Google search of hitmanpro and sophos endpoint quickly shows you this fact and this thread. So anyone who spends all day trying to get rid of it without easily figuring out where it cam from needs to re-evaluate their profession.
Special maintenance release: this is the last build that supports Windows XP, Windows Vista and Windows 7 RTM (no service pack). These Windows versions only support SHA-1 for code-signing certificates. Microsoft decided to require SHA-2 for new drivers while it did not release SHA-2 support for these Windows versions. So, in other words, we cannot release new kernel-mode drivers (with new functionality) for these older operating systems. If you run one of these old Windows versions we urge you to upgrade. On these Windows versions, HitmanPro.Alert will no longer update itself after this build.Both 32-bit and 64-bit versions of Microsoft Windows 7 SP1, Windows 8, Windows 8.1 and Windows 10 remain supported and will soon receive a new HitmanPro.Alert version with new features.
I think the hackers are very clever and will reverse engineer anti-ransomware protections so as to defeat them. I expect they will go after the big players such as Bitdefender first (but Bitdefender is very good for most other malware). There are different types of anti-malware, such as database matching, heuristic and behavioral. Some work in real time and others stop it after seeing what it is doing or matching it to known patterns in their database or try to clean up/remove after the fact (but the latter are not effective for anti-ransomware). No program is 100% effective at least against zero day attacks so I do not trust just one. And anyway many depend of definitions being kept up to date and the database is not updated until after booting to the desktop and in the case of an infrequently used laptop, may be days or weeks out of date. I do not think Bitdefender protects a browser in a fashion similar to HMPA and while I have Sandboxie, it is clunky to use if something needs to be saved to disk outside the virtual machine. I also think Bitdefender does not even try to protect everything from anti-ransomware. I read on another forum that you should not use Bitdefender TIS with HMPA but my new account has not yet been approved so I cannot yet ask why.
As said, the case of using several products is problematic, even if they don't have overlapping features. Think of protecting your home with a burglar alarm and also entrusting a security firm (who aren't told of the alarm) with patrolling it. This can lead (and has lead) to very unfortunate situations. Can't say though if TIS and HMPA would clash.
Furthermore, can you get you software writers to create a proper installation program that doesn't setup the service without a quote delimited path. This is a security "no no". Particularly impressive in a security product!
Hackers will have access to much more advanced tools that can steal your PII. If you want an antivirus with keylogging protection, you should check out our 5 best antiviruses with keylogger protection.
Version 3 of HitmanPro has three different types of antimalware scans: Default Scan, Quick Scan, and Early Score Warning. The Default Scan will check the entire computer and will send suspicious files to the cloud. The Quick Scan will scan only common parts of infections and will send unknown files to the cloud. The Early Score Warning will scan the entire computer and examine each and every file with advanced heuristics and check for common symptoms of malware, including if it was recently installed on the computer, if it starts automatically when windows boots, if it is impersonating a common system file, and even if it has a tray icon in the taskbar.[4]
I'm looking into buying a new antivius and I've come up with these 2, but I can't decide which one I should pick up. I'm a experienced user & software developer so I need an antivirus that doesn't just eat all my files.
Is Hitman Pro Alert compatible with other antivirus solutions as layered security or does it's continuous protection get in the way of other antivirus solutions? My current is Kaspersky Internet Security, is it good enough to not warrant Hitman Pro Alert?
To drive continuous reporting on the standalone version, to which we have committed to detect and assess continuously, Flexera will continue to detect the standalone product without changing its detection assessment mechanisms.
Naturally, Flexera is looking to establish a contact with the vendor in relation to this problem; but in the meanwhile, until a good solution is found, please follow the hereby mentioned suggestions if you are running a bundled version of HitmanPro.Alert 3.x.
The only feature that could be categorized as anti-fraud is the encryption that comes standard with HitmanPro.Alert. By encrypting your traffic, it hides your personal information and shields you from data theft or keyloggers that could steal your credentials. This feature comes with HitmanPro.Alert and not HitmanPro. You can see it working in the lower-right corner of your browser.
The initial scan ran in under 5 minutes, and subsequent scans all clocked in at a minute or less. We were surprised when HitmanPro.Alert caught something on our device, and a large red box appeared. Next to the suspicious file was a drop-down menu with the option to run, quarantine, or delete the file. We chose to delete it and HitmanPro.Alert took care of it.
HitmanPro is under the parent company Sophos, which is a trusted brand. On top of that, HitmanPro uses Sophos\u2019 name generously across its website. Couple that name recognition with the results we got from testing it, and we would consider HItmanPro to be trustworthy.
Finally, custom HIPS rules to protect the browser need to be created to pass most of the test tool's exploit tests. The primary rule that needs to be created is to prevent browser process modification since most of the tests involve setting a hook in the browser to perform the simulated exploit. Most important however is to realize Eset does not recognize the test tool as malware which it is not. As such Eset with default settings will allow the individual tests performed by the tool to run unimpeded. Such would not be the case for a known exploit.
ESET hopes to catch the exploit with the webshield, based on signature of the exploit vector, on cloud based detection and maybe with some generic HIPS rules but no, there is no dedicated shield against antiexploit.
One thing I have noticed from dedicated anti-exploit products is that they inject dll into various processes most likely to monitor their behavior for possible exploitation. However if one checks with Process Explorer you hardly see any dll from ESET. At most, you can see dll in browsers like Chrome and Firefox but those are for the Banking feature.
Honestly you would think after years of the same/similar threads that people would eventually understand that "Tests" don't equate to real world.
It's a very rare occurrence when ESET products actually fails to protect people in "Everyday" use, hence why the forums are nearly devoid of any complaints regarding infection.
The OP and others keep relating to tests but have never fell short of protection themself when using the products.
Unless you get infected with something or fall victim to some kind of ransomware when posting "What If's" is fruitless and misleading to other users.