Placing items in "Ignore Always"

  • Thread starter Thread starter DrMicro
  • Start date Start date
D

DrMicro

I run a small IT consulting business and several programs
I maintain and/or evaluate for some of my corporate
customers who want to be able to keep track of what threir
employees are doing on their dime include keyloggers,
remote admin tools, screenshot ftp clients, etc.

Here's my problem and my question: If I place a program
in "ignore always" status, and then run Microsoft's
antispyware program on another customer's hard drive that
I have temporarily installed in my isolated test network,
will it detect UNWANTED components of the same program,
origin or type that I have previously placed in "always
ignore" status, but from another source location?
 
I wouldn't bet on it. It depends on how specific the detections are, and
there are myriad examples in these groups of detections that appear at least
on the surface as so unspecific as to be laughable.

If you want an app suitable for enterprise distribution set to mask a
specific set of management tools, this beta version isn't it.
 
Back
Top