Install Guide

Table Of Contents
Features Policies Windows macOS Linux
Auto Upload
x x x
Policy Safe List
x x x
Memory Actions
Memory Protection x x x
Exploitation
Stack Pivot x x x
Stack Protect x x x
Overwrite Code x n/a
RAM Scraping x n/a
Malicious Payload x
Process Injection
Remote Allocation of Memory x x n/a
Remote Mapping of Memory x x n/a
Remote Write to Memory x x n/a
Remote Write PE to Memory
x n/a n/a
Remote Overwrite Code x n/a
Remote Unmap of Memory x n/a
Remote Thread Creation x x
Remote APC Scheduled x n/a n/a
DYLD Injection x x
Escalation
LSASS Read x n/a n/a
Zero Allocate x x
Protection Settings
Execution Control x x x
Prevent service shutdown from device x x
Kill unsafe running processes and their
sub processes
x x x
Background Threat Detection x x x
Watch for New Files x x x
Maximum archive file size to scan x x x
Exclude Specific Folders x x x
Copy File Samples x
Application Control
Change Window x x
Folder Exclusions x
Agent Settings
Enable auto-upload of log files x x x
18 Requirements