Controlling access to processes

Malicious programs can strike by accessing legitimate processes to retrieve sensitive data or inject malicious code into them.

Rules that regulate access to SES Evolution processes enable protection against such attacks without completely blocking inter-process communication, some of which is legitimate.

Access to a process or thread cannot be fully blocked, but you can restrict privileges during this operation.

These rules apply only to applications, not drivers.

EXAMPLE
Blocking access to the memory of a process can prevent passwords from being stolen from a browser's memory when it is open.
Other examples are given at the end of this section.