This site is for Avast Business products only. For articles on AVG Business products, see AVG Business Help. If you are in the right place but cannot find what you are looking for, please contact Avast Business Support for further assistance.

Behavior Shield

This Article Applies to:

  • Avast Business CloudCare

IMPORTANT: The CloudCare console does not support opening multiple tabs in the same browser session. Please use multiple browsers or incognito mode instead.

 

Behavior Shield is an additional layer of Antivirus active protection. It monitors all processes on the device in real time for suspicious behavior that may indicate the presence of malicious code. Behavior Shield works by detecting and blocking suspicious files based on their similarity to other known threats, even if the files are not yet added to the virus definitions database.

Behavior Shield is available for Windows workstations only.

Configuring Behavior Shield Settings

To access Behavior Shield settings:

  1. Go to the Policies page (at partner level for master policies or customer level for customer policies)
  2. Select the desired policy from the left-hand pane
  3. Under Endpoint Protection, expand the Antivirus section
  4. Go to the Behavior Shield tab

The available configuration options are grouped as follows:

  • Main Settings define which action the shield should perform upon detecting a suspicious program:
    • Always ask: Behavior Shield asks what you want to do with a detected threat before any action is taken.
    • Automatically move detected threats to the virus chest: Threats that behave similarly to known threats listed on the Avast virus definitions database are moved to Quarantine.
    • Automatically move known threats to the virus chest (enabled by default): Threats that are listed on the Avast virus definitions database are moved to Quarantine, unknown threats will be asked.
  • Exclusions allow specifying locations that should be excluded from Behavior Shield scans.

FAQ

 

Other Articles In This Section:

File Shield

Web Shield

Mail Shield

Related Articles:

Managing Policies