Why is aligning with your antivirus important while installing our product?
For some years now, antivirus programs have evolved from detecting pre-registered evasive binaries to a more general control based on behavioral analysis, leaving the responsibility to the client to authorize or not programs that use certain operating system resources. There are APIs that all developers use, such as reading typed content, analyzing the activity of programs running on the system, monitoring who is accessing which file, among many others. These APIs can be used by both the original components of the operating system and third-party software. Now, all these specific accesses are monitored by antivirus programs, which, when detected, are considered evasive and generate warnings or even blocks by the antivirus programs.
Due to the nature of our solution, it makes use of all these monitoring APIs, as the objective of our product is to analytically and documentally report everything that happens on the computer, at both the hardware and software levels, as well as user usage. These analyses are used both to measure user productivity and to analyze system security.
It is important to maintain harmony between our solution and other solutions installed to protect the system; therefore, both solutions must work together. To achieve this, it is enough to declare this harmonious and complementary relationship within the antivirus.
That is why we maintain a partnership with the main antivirus programs on the market, trying to reduce these detections characterized as "false positives" by adding our solution to whitelist, although not all antivirus programs have this possibility.
Thus, if you have problems installing our agent, the safest way to install it in some cases is to pause the antivirus and proceed with the installation. Depending on the antivirus, it may be necessary to add our agents to the antivirus exclusion lists, a process that only the user can perform.
Our solution has existed for more than 20 years and is now installed on more than 100 million computers worldwide. Corporate antivirus programs can create exclusions and additions of hashes globally, avoiding any problems with network-wide installation, but personal antivirus programs with local control depend on user intervention.
Negative scenarios that may arise during installation
Glossary
Check the mandatory step to understand how our product will be compliance with your antivirus
Agents | Release Date | Avast | BitDefender | KasperSky | McAfee | Sophos | Symantec | Windows Defender | AVG | Trellix |
Juniper | 09/22/24 | Whitelist / 10.05 | Whitelist / 10.05 | No Detection / 10.01 | Whitelist / 10.05 | No Detection / 10.01 | Whitelist / 10.04 | No Detection / 10.02 | No Detection / 10.02 | Awaiting Response / 09.23 |
Syrax | 09/02/24 | Whitelist | No Detection | No Detection | Whitelist | No Detection | Whitelist | No Detection | No Detection | Awaiting Response |
Pulte | 08/05/24 | Whitelist | No Detection | No Detection | Whitelist | No Detection | Whitelist | No Detection | No Detection | No Detection |
Serenoa | 07/22/24 | Whitelist | No Detection | No Detection | Whitelist | No Detection | Whitelist | Whitelist | No Detection | No Detection |
Stitch | 07/01/24 | Whitelist | Whitelist | No Detection | Whitelist | No Detection | Whitelist | No Detection | No Detection | No Detection |
Descriptions:
No Detection: Agent sent to the antivirus, and we received feedback that it does not have detection in the mentioned antivirus;
Whitelist: Whitelist represents the agents that have been added to the official exceptions list of the antivirus;
Awaiting Response: Agent sent and we are still awaiting the official response;
Pending: We have not received a response from the antivirus after multiple submissions.