Key features of Aurora Protect Desktop

Feature Description

Detect and quarantine malicious files

Aurora Protect Desktop provides options for handling files that it detects as either unsafe or abnormal. You can add files identified in threat events to a quarantine list or a safe list for handling future events.

Protect against memory exploits

Aurora Protect Desktop provides options for handling memory exploits, including process injections and escalations. You can also add executable files to an exclusion list, allowing these files to run when a device policy is applied.

Block malicious scripts

Aurora Protect Desktop monitors and protects against malicious scripts running in your environment. The Aurora Protect Desktop agent is able to detect the script and script path before the script is executed and block it.

Block threats from USB storage devices

Aurora Protect Desktop controls how USB mass storage devices can connect to devices in your organization. You can allow or block USB mass storage devices, including USB flash drives, external hard drives, and smartphones.

Receive immediate alerts

Aurora Protect Desktop monitors the execution of malicious processes and alerts you when anything unsafe or abnormal attempts to run.

Detect inactive devices

If the Aurora Protect Desktop agent has been out of contact for a specified period of time, the device state changes to inactive. You can review inactive devices to determine if they should be removed from the management console.

Protect virtual machines

Aurora Protect Desktop is not as resource intensive on a per-guest basis because the technology does not require daily disk scans. Aurora Protect Desktop is also not as memory intensive on a per-guest basis.