G DATA Antivirus Business

G DATA Antivirus Business runs integrated in O&O Syspectr and proactively warns you if one of your endpoints is unprotected or a suspicious file is found during a scan. This is automatically isolated from the computer, you are informed and can act immediately: using the integrated remote desktop, you can check the find or simply switch off the machine with one click.

License

G DATA Antivirus Business is a paid premium module that you can purchase directly in O&O Syspectr or through an authorized partner. A premium or enterprise license from O&O Syspectr is required to use G DATA Antivirus Business.

You can purchase G DATA Antivirus Business together with O&O Syspectr or buy it separately at any time. We also offer inexpensive further licenses if you want to equip additional computers.

Overview

On the overview page you can immediately see whether and how a system is protected and whether threats have been found. The times of the last scan are also displayed there. You can start an immediate scan there too.

Scheduled Tasks

Under "Scheduled Tasks" you can create one-time or recurring tasks for review, choosing days of the week and time for each scheduled task. In addition, you can define a variety of options for the task via the advanced settings.

Reports

Here the latest scans and detections of threats are documented in a table. You can click on the entries to get more information.

Settings

You can configure G DATA Antivirus Business individually in the settings. The default settings should be sufficient for common use cases. You can of course adjust these individually and reset them at any time.

Virus Monitor

The virus monitor should always be active. If you want to switch off the monitor or want to change something in the settings, please click on Turn off virus monitor.

Enabled: Switch the Virus Monitor on or off. In general, you should leave the monitor switched on, as it is the foundation of permanent and uninterrupted virus protection.

Action when data infected

Specify the action to be taken if an infected file is detected. There are various options that may or may not be suitable, depending on what the respective client is used for.

Block file access Neither read nor write access will be granted for an infected file.

Disinfect and move to quarantine The file is moved to quarantine and an attempt is made to remove the virus.

Move to quarantine The infected file is moved to quarantine. The system administrator can then try to manually disinfect the file.

Delete This function serves as a strict measure for effectively containing a virus. In the rare case of a false-positive virus message, this may lead to data loss.

Scan Mode

Here you can specify whether files should be scanned on execution, only on read, or on both write and read. If the check is carried out when a file is written, then when a new file or file version is created, it is checked whether an unknown process may have infected this file. Otherwise, files are only checked when they are read by programs.

While reading Scans every file directly when it's read.

While reading and writing Adds a scan on writing, to protect against viruses that are copied from another possibly unprotected client or from the Internet.

When executing Scans files only when they are executed.

BEAST: Protection against new malware

BEAST protects you from new and previously unknown malware. Unlike conventional behavioral analysis, this technology records the entire system behavior in a graph and thus provides a holistic view. This is how BEAST accurately detects malicious processes and can stop them immediately.

Action on suspicious software

Log entry only Stop software Stop software and move to quarantine

Inform user of suspicious software

Enabled: the user will also receive a notification.

Exploit Protection

A so-called exploit uses the vulnerabilities of common user software and, in the worst case, can take control of your computer via these vulnerabilities. Exploits can take effect even if applications (e.g., PDF viewers, browsers) are regularly updated. Exploit Protection protects against such access, including proactively against previously unknown attacks.

Action on exploit

Log entry only Prevent execution

Inform user about Exploits

Enabled: the user will also receive a notification.

Keyboard Guard

Protect your PC against manipulated USB devices by using the free G DATA USB Keyboard Guard. Maliciously reprogrammed USB devices, such as cameras, USB sticks or printers, can act as keyboards when they are plugged in to a computer. To prevent those devices from automatically carrying out unauthorized commands, USB Keyboard Guard will ask the user for confirmation if it detects a USB device that identifies itself as a keyboard. If the user indeed plugged in a keyboard, it can be safely authorized. If the device identifies itself as a keyboard but the user plugged in something else, it should not be authorized, as it may be malicious.

Ransomware Protection

The literal meaning of "ransom" describes the target of ransomware. The malware encrypts important files, making them unusable and demanding payment of a significant sum of money for decryption - usually in the form of bitcoins, where the flow of money is easier to disguise than with conventional currencies. The malware holds the data hostage and only releases it again after paying a ransom.

Action on ransomware detection

Log entry only Move to quarantine

Inform user about Ransomware

Enabled: the user will also receive a notification.

Anti Malware Scanning Interface (AMSI)

Fileless malicious code is detected and blocked even better thanks to the AMSI interface. Malicious programs are not always used as scannable files; the components are only assembled into malicious code when they are executed. In these cases, the script for execution is in memory. AMSI allows code inspection and blocking in case of malicious code.

Inform user about Malware (AMSI)

Enabled: the user will also receive a notification.

Scan when idle

While the virus monitor permanently protects your system from malware infections, the idle scan is an intelligent virus check that repeatedly checks all files on your computer to see whether they are already infected with a virus. Note: This setting is set by default for PCs and is disabled for servers and virtual machines.

DeepRay®: Protection with AI and ML

Cyber criminals typically use the same malware cores over and over again. To avoid detection, attackers use packers to compress the malicious code or various types of obfuscation to avoid static detection. The actual malware core is only unpacked in the main memory. DeepRay´s approach is to detect the presence of an outer shell with a neural network.

Email check

With the e-mail check, you can check incoming and outgoing e-mails and their file attachments for viruses and eliminate possible infections directly at the source. The default ports for the POP3, IMAP, and SMTP protocols will be monitored. The software is capable of directly deleting file attachments or repairing infected files when a virus is found.

OutbreakShield (SPAM Protection in Real Time)

With OutbreakShield, malware in mass emails can be detected and combated before updated virus signatures are available. The OutbreakShield uses the Internet to inquire about particular accumulations of suspicious e-mails, thereby closing the gap between the start of mass mailings and combating them using specially adapted virus signatures, almost in real time.

Outlook Protection

Microsoft Outlook is protected by a special plug-in that allows you to check folders and emails directly from Outlook. To scan an e-mail or a folder for viruses in Outlook, simply select Extras > Scan folder for viruses in the Outlook menu bar. and the currently selected mail folder is checked for viruses.

Web Protection

Web protection is a module that automatically detects threats when surfing the Internet and downloading and, if necessary, renders them harmless. It serves as a useful support for the virus monitor and blocks malicious websites and downloads before they can even be accessed.

Uninstall G DATA Antivirus Business client from this computer

Uninstalls the G DATA Antivirus Business client from this computer and releases the license.