| 
 Component  | 
 Description  | 
|---|---|
| 
 Behavior Monitoring Detection Pattern 32/64-bit  | 
 This pattern contains the rules for detecting suspicious threat behavior.  | 
| 
 Behavior Monitoring Core Driver 32/64-bit  | 
 This kernel mode driver monitors system events and passes them to the Behavior Monitoring Core Service for policy enforcement.  | 
| 
 Behavior Monitoring Core Service 32/64-bit  | 
 This user mode service has the following functions: 
  | 
| 
 Behavior Monitoring Configuration Pattern  | 
 The Behavior Monitoring Driver uses this pattern to identify normal system events and exclude them from policy enforcement.  | 
| 
 Digital Signature Pattern  | 
 This pattern contains a list of valid digital signatures that are used by the Behavior Monitoring Core Service to determine whether a program responsible for a system event is safe.  | 
| 
 Policy Enforcement Pattern  | 
 The Behavior Monitoring Core Service checks system events against the policies in this pattern.  | 
| 
 Memory Scan Trigger Pattern (32/64-bit)  | 
 Behavior Monitoring uses the Memory Scan Trigger Pattern to identify possible threats after detecting the following operations: 
 After identifying one of these operations, Behavior Monitoring calls Real-time Scan's Memory Inspection Pattern to check for security risks. For details about the Real-time Scan operations, see Memory Inspection Pattern.  | 
| 
 Damage Recovery Pattern  | 
 The Damage Recovery Pattern contains policies that are used for monitoring suspicious threat behavior.  | 
| 
 Program Inspection Monitoring Pattern  | 
 The Program Inspection Monitoring Pattern monitors and stores inspection points that are used for Behavior Monitoring.  | 
Views: 
				
			
		
		