![]() From AV to AV it can still vary how many resources it needs but for large backups / syncs any AV client will take considerable resources. And with a large amounts of files, it will require any AV to take the needed resources of the system to be able to complete the task. Being time machine, crashplan (in my current case) or restic (or even rsync cloning), if files get touched / read / written with realtime protection, the AV client will try to scan them. The brand / type of backup application does not really matter that much in my opinion. The only feature I would surely find useful today already (without really looking into what is possible on the Windows client) is the Exclusions setting: File or Folder, Previously Detected Exploit but also Application / Process I would find quite useful Sorry, seems a mistaken key combo posted my unfinished reply, continuing. I'm curious as to exactly which of the Windows Setting you feel could be excluded in your setup to preclude that specific issue? The only two exclusions I see that would be applicable to the current version of Mac Malwarebytes are "File or Folder" and " Previously Detected Exploit" and I don't see how either would apply to backup software.Ĭertainly low CPU use has always been a hallmark objective of Malwarebytes for Mac and it's predecessors and I don't expect that to be relaxed as a high priority goal going forward. That being said, I believe the developer is aware of some issues involving backup software (it might be helpful to mention it by name here) and is actively working to overcome such problems. ![]() I am aware of a few such features that have been and will continue to be added to the Mac version, but I don't think you should expect all of them to be since the Operating Systems are very different with regard to the available attack vectors and locations in which malware can be installed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |