AMTSO unveils product setup check tools

Posted by   Virus Bulletin on   Jun 4, 2013

Set of checks can show if your security is properly configured and operational.

Today AMTSO officially released its 'Feature settings check' solutions, a set of simple tools to enable anyone to test whether their anti-malware solution is properly set up and working.

Hosted on the AMTSO website, the checks cover a range of standard anti-malware features, including protection against both manual and drive-by downloads, alerting on phishing pages, detection of 'potentially unwanted' software and proper connection to cloud lookup systems.

The checks are performed using specially crafted test files and pages, which the industry has agreed to include the proper detection for in their products. These include the long-standing EICAR test file, but also some newer items developed specially for the AMTSO check tools.

At the initial launch the checks are supported by many leading anti-malware vendors, including Agnitum, Avast, AVG, Avira, ESET, F-Secure, G Data, K7, Kaspersky, McAfee, Norman, Panda, Sophos, Symantec and Trend Micro. Other vendors are expected to join in soon. Not all vendors support all the checks, depending on the features implemented in their products.

The full set of checks can be accessed here, with details of which vendors support each check listed on the individual check pages.

Posted on 04 June 2013 by John Hawes



Latest posts:

Standalone product test: FireEye Endpoint

Virus Bulletin ran a standalone test on FireEye's Endpoint Security solution.

VB2017 video: Consequences of bad security in health care

Jelena Milosevic, a nurse with a passion for IT security, is uniquely placed to witness poor security practices in the health care sector, and to fully understand the consequences. Today, we publish the recording of a presentation given by Jelena at…

Vulnerabilities play only a tiny role in the security risks that come with mobile phones

Both bad news (all devices were pwnd) and good news (pwning is increasingly difficult) came from the most recent mobile Pwn2Own competition. But the practical security risks that come with using mobile phones have little to do with vulnerabilities.

VB2017 paper: The (testing) world turned upside down

At VB2017 in Madrid, industry veteran and ESET Senior Research Fellow David Harley presented a paper on the state of security software testing. Today we publish David's paper in both HTML and PDF format.

VB2017 video: Turning Trickbot: decoding an encrypted command-and-control channel

Trickbot, a banking trojan which appeared this year, seems to be a new, more modular, and more extensible malware descendant of the notorious Dyre botnet trojan. At VB2017, Symantec researcher Andrew Brandt presented a walkthrough of a typical…