¥Î§ó§Cªº¦¨¥»»P§ó¦nªº³W½d¨ú±o±j¤jªº¦w¥þ¨¾Å@
³W½d¿í´`¡C «Â¯Ù«ùÄòºt¶i¡C ½ÆÂøªººô¸ô¡C ¨Ï¥Î§¹¾ã¡BºÝÂI¹ïºÝÂIªº¸Ñ¨M¤è®×¨Ó«OÅ@¥ø·~»P°§C·ÀI¡A¦P®É°§C¦¨¥»¡C ¨ú±o«ùÄò¡B§ó·s¡B²£·~µ¥¯Åªº´c·N³nÅ騾Å@¡Aªý¾×¥]¬A rootkit ©MÀb«È§ðÀ»µ¥«Â¯Ù¡C ¥Ñ McAfee ePolicy Orchestrator® ªº³æ¤@¥D±±¥x¶i¦æºÞ²z¡A¨ú±o¾ã¦X»P¦³®Ä²vªº¦w¥þ©Ê¡C
¯S¦â:
-
³æ¤@ºÞ²z¥D±±¥x
´£¤É¥i¨£«×¡A¦P®É°§CºÞ²z¦¨¥»¡FMcAfee ePolicy Orchestrator ¾ã¦X¦¡¥D±±¥x¯à¨ó§U¦w¥þ¤Hû§ó®e©ö¦a¸¨¹ê¬Fµ¦ªk³W¡A¨Ã¥B¨Ï²Õ´«O«ù³Ì¨Îªº¦w¥þª¬ºA -
±`¾n±½´y¯à°»´ú¶¡¿Ò³nÅé¡B´c·N³nÅé»P PUP
ÁקK´c·N³nÅé¡B¶¡¿Ò³nÅé»P¥i¯à¤£»Ýnªºµ{¦¡ (PUP) ¦w¸Ë¨ÃÂX´²¨ì¨t²Î¤W¡F§Ú̪º§Þ³N·|Àˬd³o¨Ç«Â¯Ùªº¦æ¬°¡AµM«á§Ö³tªý¾×¤wª¾»P©|¥¼µo²{ªº«Â¯Ù¡AÁקK¥¦Ì¦M®`±zªº¦w¥þ -
¥ý¶iªº®zÂI¨¾Å@¯à¤O
§Q¥Î¦Û°Ê§ðÀ»¯S¼x§ó·s¨Ó«Ì½ª®zÂI¡F§Ų́ã±M§Qªº¦æ¬°¦¡§Þ³N¯àÁקKÀb«È³z¹L½w½Ä°Ï·¸¦ì§ðÀ»ªº¤âªk¡A±N´c·Nµ{¦¡½X´Ó¤J±zªº¨t²Î¤¤ -
¥ý¶iªº¹q¤l¶l¥ó¯f¬r»P©U§£¶l¥ó¨¾Å@
¹LÂo¶Ç¤J»P¶Ç¥Xªº¹q¤l¶l¥ó¡A±½´y¬O§_¦³©U§£¶l¥ó¡B¤£·í¤º®e»P¯f¬rªº¦s¦b¡F¹jÂ÷¥iºÃªº¹q¤l¶l¥ó¡AÁקK³o¨Ç«ùÄò¶i¤Æªº«Â¯Ù¦M®`ºô¸ô»P¨Ï¥ÎªÌ -
«OÅ@µêÀÀÀô¹Ò
½T«OµêÀÀÀô¹Ò¤¤¨S¦³´c·N³nÅé©M¨ä¥L«Â¯Ù¡FµêÀÀÀô¹Ò±¹ïªº¦w¥þÀ£¤O»P¹êÅéÀô¹Ò¬Û¦P©Î§ó¦h¡A¦]¦¹»Ýn¥þ±©Êªº«OÅ@±¹¬I -
¦b¶i¶¥ª©¥»¤¤¥i¥H¨ú±o NAC ¸Ñ¨M¤è®×
¶i¶¥ª©ªº McAfee Total Protection for Endpoint ´£¨Ñ¤F NAC ¥\¯à¡FNAC ¥i¥H¨ó§U±zÃѧO¡B¹jÂ÷»P׸ɤ£¦X¥G³W½d¡B¤¤¬r»P³]©w¿ù»~ªº¨t²Î