Yes--one way in which this is evidenced is in the products which allow
remote access to a machine. Microsoft Antispyware detects these with
certain conditions. Remote Desktop and Remote Assistance, which require
credentials and give clear evidence to the local user when they are invoked,
are not flagged. A number of commercial products which can be invoked
without notice to the local user are flagged. This is an issue in an
enterprise environment where such a tool is a standard part of the
environment, and the users are on notice that it exists--and that's part of
why this KB article exists:
http://support.microsoft.com/kb/892375 End users may be prompted to allow or
block administrative actions that originate from a central management tool
after they install Windows AntiSpyware (Beta) on a computer that is managed
by Systems Management Server 2003
If you were to find that you have such a product installed and running, and
had no knowledge of that, you'd likely be very glad to have heard about it
from Microsoft Antispyware.
(I'm certain that there are also networks where managers have this kind of
software in place and haven't notified the users, but I don't want to
complicate the discussion!)
--
FAQ for Microsoft Antispyware:
http://www.geocities.com/marfer_mvp/FAQ_MSantispy.htm
Jacques said:
There is the same with viruses, worms and other trojans. There is always a
fight for the grey zone (some companies use viral or trojan technics in
their "commercial products"). Good AV tools detect them and give an
opportunity to by-pass diag in further scans. It may be difficult in
corporate env. which explain more expensive charge for tem.
"Bill Sanderson" <
[email protected]> a écrit dans le
message de (e-mail address removed)...