OSArmor is a Windows OS application that monitor and block suspicious processes behaviors
to prevent infections by malware, ransomware, and other threats. This tool analyzes parent processes and prevents, for example, MS Word from running cmd.exe or powershell.exe. It prevents ransomware from deleting shadow copies of files via vssadmin.exe, blocks processes with double file extensions (i.e invoice.pdf.exe), blocks USB-spreading malware, and much more. It is lightweight, requires zero user input
and protects your system while running in the background.
For Windows 7 SP1, 8, 10, 11 (32 & 64-bit)
This smart security application focuses on preventing malware infections by applying smart and intelligent rules that block malicious processes behavior. This tool can block threats not detected by your installed security solution. Add an additional layer of defense to your system and prevent infections by malware and ransomware! You don't have to configure anything, just install it and forget about it. We have already added more than 250 smart policies to improve your system security with this security application.
Analyze parent processes and child processes blocking exploit payloads.
Prevent WINWORD.EXE or EXCEL.EXE from executing malicious processes.
Monitor Adobe PDF Reader, MS Office, OpenOffice, Web Browsers, etc.
Prevent execution of processes started via autorun.inf from USB devices.
Block processes with command-line strings commonly related to malware.
Block system processes (vssadmin.exe, etc) from deleting shadow copies of files.
Block specific command-lines related to download of remote files.
Block execution of processes with .COM or .PIF obsolete file extensions.
Block wscript.exe, mshta.exe, etc if they match our rules of bad behaviors.
Prevent important and critical system modifications from Bcdedit.exe
Prevent Bitsadmin.exe from downloading (/download) remote files.
Block execution of encoded or malformed commands via PowerShell.
You can exclude specifc processes or events from being blocked.
You can write your own custom block rules to block specific processes.
Prevent calling of Application.Excel RegisterXLL() via command-line.
Prevent Regsvr32.exe or Mshta.exe from loading remote scripts.
Our internal smart rules can block known and not-yet-known suspicious process activities.
The software application uses only a few MBs of memory, you will not even notice it.
With this video we show you OSArmor in action, it blocks
various Microsoft Office exploit payloads.
|Last Updated||July 01, 2022|
|Operating System||Windows 7 SP1, 8, 10, 11 (32 & 64-bit)|
|Server Version||Windows Server, 2008, 2012, 2016, 2019 (32 & 64-bit)|
|Category||Malware Prevention Tool|
|File Size||50 MB|
Have questions? Don't hesitate to contact us directly via email.
If you don't receive a reply in one or two business days, please re-send the message.
Here is our email (it is an image to prevent spam):