<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[GETOVERX FORUM Community Support - GetOverX Shield Security Lab]]></title>
		<link>https://forum.getoverx.com/</link>
		<description><![CDATA[GETOVERX FORUM Community Support - https://forum.getoverx.com]]></description>
		<pubDate>Fri, 17 Apr 2026 09:51:19 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Per-version report - GetOverX Shield macOS 1.0.0]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=137</link>
			<pubDate>Wed, 10 Dec 2025 00:57:05 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=137</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield macOS <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.0<br />
- Result:<span style="font-weight: bold;" class="mycode_b">0/71</span><br />
All Passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for macOS)</span><br />
When the macOS installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launch of helper tools and installation routines via standard macOS installer mechanisms.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of launch agents / launch daemons and registration of system extensions or network extensions.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of signed and protected components, plus controlled interception for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of basic system, user and process information required for endpoint protection.<br />
<br />
No typical macOS malware behaviours were observed:<br />
- No unauthorised modification of user home directories beyond configuration and logs.<br />
- No mass encryption or deletion of user files.<br />
- No covert network connections to unknown C2 servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean macOS virtual machines or test devices (supported macOS versions).<br />
- Verified:<br />
  - Correct loading of system / network extensions.<br />
  - Real-time monitoring and alerting capabilities.<br />
  - Log generation and integration with the central management console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested macOS build behaves as expected for an endpoint protection agent:<br />
- External engines do not report classic malware; any isolated detection is related to strict policies on system and network extensions.<br />
- Behavioural analysis shows installation, registration of protection components and monitoring activity, without signs of macOS-specific backdoors, data theft or ransomware behaviour.<br />
<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/84c7...1fc593989f</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield macOS <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.0<br />
- Result:<span style="font-weight: bold;" class="mycode_b">0/71</span><br />
All Passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for macOS)</span><br />
When the macOS installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launch of helper tools and installation routines via standard macOS installer mechanisms.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of launch agents / launch daemons and registration of system extensions or network extensions.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of signed and protected components, plus controlled interception for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of basic system, user and process information required for endpoint protection.<br />
<br />
No typical macOS malware behaviours were observed:<br />
- No unauthorised modification of user home directories beyond configuration and logs.<br />
- No mass encryption or deletion of user files.<br />
- No covert network connections to unknown C2 servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean macOS virtual machines or test devices (supported macOS versions).<br />
- Verified:<br />
  - Correct loading of system / network extensions.<br />
  - Real-time monitoring and alerting capabilities.<br />
  - Log generation and integration with the central management console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested macOS build behaves as expected for an endpoint protection agent:<br />
- External engines do not report classic malware; any isolated detection is related to strict policies on system and network extensions.<br />
- Behavioural analysis shows installation, registration of protection components and monitoring activity, without signs of macOS-specific backdoors, data theft or ransomware behaviour.<br />
<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/84c7...1fc593989f</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - GetOverX BlackDog Linux 1.0.0.1]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=136</link>
			<pubDate>Wed, 10 Dec 2025 00:54:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=136</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX BlackDog Linux <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Package SHA-256 hash:</span> [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.1<br />
- Result: <span style="font-weight: bold;" class="mycode_b">0/71]</span><br />
- Isolated detection(s), if any:<br />
 All passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for Linux)</span><br />
When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launching of daemon processes and helper binaries.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of systemd service units / init scripts to start at boot.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of protected binaries and root-level components for monitoring (according to the distribution’s security model).<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> enumeration of system information, running processes and network configuration to build telemetry.<br />
<br />
No destructive Linux malware behaviours were observed:<br />
- No unauthorised modification of `/etc` core configuration beyond its own services.<br />
- No mass deletion or encryption of user data.<br />
- No exfiltration of logs or files to unknown remote hosts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on fresh Debian/Ubuntu-based virtual machines.<br />
- Verified:<br />
  - Proper registration of systemd services.<br />
  - Network and filesystem monitoring components.<br />
  - Log generation under `/var/log` or the configured logging path.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested BlackDog Linux build behaves as expected for a Linux security agent:<br />
- Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools.<br />
- Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity.<br />
<br />
Link test:<br />
<a href="https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/f0d1...0c293f0ca2</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX BlackDog Linux <span style="font-weight: bold;" class="mycode_b">1.0.0.1</span><br />
<span style="font-weight: bold;" class="mycode_b">Package SHA-256 hash:</span> [f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 1.0.0.1<br />
- Result: <span style="font-weight: bold;" class="mycode_b">0/71]</span><br />
- Isolated detection(s), if any:<br />
 All passed<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK for Linux)</span><br />
When the BlackDog Linux package was executed in a sandbox/container environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> launching of daemon processes and helper binaries.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence:</span> creation of systemd service units / init scripts to start at boot.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of protected binaries and root-level components for monitoring (according to the distribution’s security model).<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> enumeration of system information, running processes and network configuration to build telemetry.<br />
<br />
No destructive Linux malware behaviours were observed:<br />
- No unauthorised modification of `/etc` core configuration beyond its own services.<br />
- No mass deletion or encryption of user data.<br />
- No exfiltration of logs or files to unknown remote hosts.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on fresh Debian/Ubuntu-based virtual machines.<br />
- Verified:<br />
  - Proper registration of systemd services.<br />
  - Network and filesystem monitoring components.<br />
  - Log generation under `/var/log` or the configured logging path.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested BlackDog Linux build behaves as expected for a Linux security agent:<br />
- Multi-AV scanning does not show classic malware signatures; any isolated flags are due to the presence of powerful system and network tools.<br />
- Behavioural analysis shows service setup and monitoring, with no evidence of data exfiltration, unauthorised privilege escalation paths or ransomware-like activity.<br />
<br />
Link test:<br />
<a href="https://www.virustotal.com/gui/file/f0d1323dc901aa346de644ab3bbd5660c9c5de3a5c3cf91f09b9890c293f0ca2" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/f0d1...0c293f0ca2</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - GetOverX Shield Server 3.0.2.0]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=135</link>
			<pubDate>Wed, 10 Dec 2025 00:41:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=135</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield Server <span style="font-weight: bold;" class="mycode_b">3.0.2.0</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: [update with engine count]<br />
- Result: <span style="font-weight: bold;" class="mycode_b">[1 / 71]</span><br />
- Isolated detection(s), if any:<br />
  - <span style="font-weight: bold;" class="mycode_b">Vendor:</span> ESET – <span style="font-style: italic;" class="mycode_i">Win64/WinDivert.A Potentially Unsafe</span><br />
  - Reason: Server edition also uses low-level drivers and network inspection modules that some vendors classify as “potentially unsafe applications” by policy, especially on servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the Server installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> service installation and use of native Windows Server APIs.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of Windows services set to start at boot, modification of relevant registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> protected components, code packing and controlled injection into own processes for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> system, role and process discovery typical for a server protection agent (services, listening ports, installed roles/features).<br />
<br />
No malicious server-side behaviours were observed:<br />
- No unauthorised modification of business data.<br />
- No tampering with domain controllers, AD objects or database services.<br />
- No exfiltration of server data to unknown external endpoints.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean Windows Server virtual machines (2016/2019/2022).<br />
- Verified:<br />
  - Service stability under load.<br />
  - Interaction with typical server roles (file server, web server, domain member).<br />
  - Logging and remote management from the console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested Server build behaves as expected for an endpoint protection agent on Windows Server:<br />
- External AV engines do not report classic malware; any isolated detection is related to the presence of powerful administration/security components.<br />
- Behavioural analysis shows service deployment, monitoring and hardening activities, without backdoor or ransomware-like patterns.<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/550e...5c3cf4ad46</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield Server <span style="font-weight: bold;" class="mycode_b">3.0.2.0</span><br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: [update with engine count]<br />
- Result: <span style="font-weight: bold;" class="mycode_b">[1 / 71]</span><br />
- Isolated detection(s), if any:<br />
  - <span style="font-weight: bold;" class="mycode_b">Vendor:</span> ESET – <span style="font-style: italic;" class="mycode_i">Win64/WinDivert.A Potentially Unsafe</span><br />
  - Reason: Server edition also uses low-level drivers and network inspection modules that some vendors classify as “potentially unsafe applications” by policy, especially on servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the Server installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> service installation and use of native Windows Server APIs.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of Windows services set to start at boot, modification of relevant registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> protected components, code packing and controlled injection into own processes for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> system, role and process discovery typical for a server protection agent (services, listening ports, installed roles/features).<br />
<br />
No malicious server-side behaviours were observed:<br />
- No unauthorised modification of business data.<br />
- No tampering with domain controllers, AD objects or database services.<br />
- No exfiltration of server data to unknown external endpoints.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Installation and removal on clean Windows Server virtual machines (2016/2019/2022).<br />
- Verified:<br />
  - Service stability under load.<br />
  - Interaction with typical server roles (file server, web server, domain member).<br />
  - Logging and remote management from the console.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested Server build behaves as expected for an endpoint protection agent on Windows Server:<br />
- External AV engines do not report classic malware; any isolated detection is related to the presence of powerful administration/security components.<br />
- Behavioural analysis shows service deployment, monitoring and hardening activities, without backdoor or ransomware-like patterns.<br />
Link Test:<br />
<a href="https://www.virustotal.com/gui/file/550e7b347f6011bb9d6a35c59382412b5bde7c3454549c24110a225c3cf4ad46" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/550e...5c3cf4ad46</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - GetOverX Shield PRO 3.0.2.0]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=134</link>
			<pubDate>Wed, 10 Dec 2025 00:38:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=134</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield PRO 3.0.2.0<br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 3.0.2.0<br />
- Result: <span style="font-weight: bold;" class="mycode_b">[update, e.g. 1 / 71]</span><br />
- Isolated detection(s), if any:<br />
  - <span style="font-weight: bold;" class="mycode_b">Vendor:</span> ESET – <span style="font-style: italic;" class="mycode_i">Win64/WinDivert.A Potentially Unsafe</span><br />
  - Reason: [Short explanation. For example: vendor classifies advanced network tools or drivers used by GetOverX Shield PRO as “potentially unsafe applications” due to their low-level capabilities. This is a strict policy decision, not evidence of classic malware.]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the PRO installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> scheduled tasks, use of native Windows APIs, loading of shared modules.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of startup tasks and services, modification of boot-related registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of packing/protection techniques, controlled process injection for monitoring and EDR telemetry.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of system, user and running process information for security analysis.<br />
<br />
No typical destructive malware behaviours were observed:<br />
- No mass encryption of user files.<br />
- No deletion of system backup copies.<br />
- No exfiltration of documents to external servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Clean install and uninstall on fresh Windows 10/11 virtual machines.<br />
- Additional tests on systems with existing AV/EDR solutions to verify coexistence.<br />
- Verified:<br />
  - Activation of the hardened firewall and advanced HIPS/EDR components.<br />
  - Real-time protection and behavioural blocking features.<br />
  - Centralised logging and retrieval of security events.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested PRO build behaves as expected for an advanced security product:<br />
- The vast majority of external AV engines report no malware.<br />
- Any isolated detection is related to strict policies on low-level security tools (drivers, deep network inspection), not a real infection.<br />
- Sandbox behaviour analysis shows installation, protection and telemetry activities (services, tasks, monitoring), without ransomware patterns or data theft.<br />
<br />
Testing Link:<br />
<a href="https://www.virustotal.com/gui/file/d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/d146...87876dca34</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield PRO 3.0.2.0<br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> [d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 3.0.2.0<br />
- Result: <span style="font-weight: bold;" class="mycode_b">[update, e.g. 1 / 71]</span><br />
- Isolated detection(s), if any:<br />
  - <span style="font-weight: bold;" class="mycode_b">Vendor:</span> ESET – <span style="font-style: italic;" class="mycode_i">Win64/WinDivert.A Potentially Unsafe</span><br />
  - Reason: [Short explanation. For example: vendor classifies advanced network tools or drivers used by GetOverX Shield PRO as “potentially unsafe applications” due to their low-level capabilities. This is a strict policy decision, not evidence of classic malware.]<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the PRO installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> scheduled tasks, use of native Windows APIs, loading of shared modules.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of startup tasks and services, modification of boot-related registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of packing/protection techniques, controlled process injection for monitoring and EDR telemetry.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of system, user and running process information for security analysis.<br />
<br />
No typical destructive malware behaviours were observed:<br />
- No mass encryption of user files.<br />
- No deletion of system backup copies.<br />
- No exfiltration of documents to external servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Clean install and uninstall on fresh Windows 10/11 virtual machines.<br />
- Additional tests on systems with existing AV/EDR solutions to verify coexistence.<br />
- Verified:<br />
  - Activation of the hardened firewall and advanced HIPS/EDR components.<br />
  - Real-time protection and behavioural blocking features.<br />
  - Centralised logging and retrieval of security events.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
The tested PRO build behaves as expected for an advanced security product:<br />
- The vast majority of external AV engines report no malware.<br />
- Any isolated detection is related to strict policies on low-level security tools (drivers, deep network inspection), not a real infection.<br />
- Sandbox behaviour analysis shows installation, protection and telemetry activities (services, tasks, monitoring), without ransomware patterns or data theft.<br />
<br />
Testing Link:<br />
<a href="https://www.virustotal.com/gui/file/d14632549a82bbb471bf3424b2242a18cac4f5498ecd5cdb4be0b687876dca34" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/d146...87876dca34</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Per-version report - Getoverx Shield CORE 3.0.2.0]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=133</link>
			<pubDate>Wed, 10 Dec 2025 00:33:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=133</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield CORE 3.0.2.0<br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> 9aa57de47ece5c48bec81d689f365e86283edf6c289af15dba8695596bc92050<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 71<br />
- Result: <span style="font-weight: bold;" class="mycode_b">1 / 71</span><br />
- Engines with no detection: 70<br />
- Isolated detection:<br />
  - <span style="font-weight: bold;" class="mycode_b">ESET-NOD32:</span> Win64/WinDivert.A <span style="font-style: italic;" class="mycode_i">Potentially Unsafe Application</span><br />
  - Reason: ESET classifies the use of WinDivert as a potentially unsafe tool because of its low-level network filtering capabilities. This is not a classic “virus” detection, but a strict policy on advanced network tools.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> scheduled tasks, use of native Windows APIs, loading of shared modules.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of startup tasks and services, modification of boot-related registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of packing/protection techniques, controlled process injection for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of system, user and running process information.<br />
<br />
No typical destructive malware behaviours were observed:<br />
- No mass encryption of user files.<br />
- No deletion of system backup copies.<br />
- No exfiltration of documents to external servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Clean install and uninstall on fresh Windows 10/11 virtual machines.<br />
- Verified:<br />
  - Activation of the hardened firewall.<br />
  - Basic operation of the real-time protection module.<br />
  - Logging and reading of security events.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
Build 3.0.2.0 CORE behaves as expected for a security product:<br />
- 70 out of 71 external AV engines do not report any malware.<br />
- The only detection comes from ESET’s policy on advanced network tools (WinDivert), not from a real infection.<br />
- Sandbox behaviour analysis shows installation and protection-related activities (services, tasks, monitoring), without ransomware patterns or data theft.<br />
<br />
Users who run ESET alongside GetOverX Shield CORE can add it (and its installation folder) to ESET’s trusted applications / exclusions list if they wish to use both on the same system.<br />
<br />
Link test Virus-Total:<br />
<a href="https://www.virustotal.com/gui/file/9aa57de47ece5c48bec81d689f365e86283edf6c289af15dba8695596bc92050" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/9aa5...596bc92050</a>]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b">Tested version:</span> GetOverX Shield CORE 3.0.2.0<br />
<span style="font-weight: bold;" class="mycode_b">Installer SHA-256 hash:</span> 9aa57de47ece5c48bec81d689f365e86283edf6c289af15dba8695596bc92050<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Multi-AV result (VirusTotal)</span><br />
- Engines: 71<br />
- Result: <span style="font-weight: bold;" class="mycode_b">1 / 71</span><br />
- Engines with no detection: 70<br />
- Isolated detection:<br />
  - <span style="font-weight: bold;" class="mycode_b">ESET-NOD32:</span> Win64/WinDivert.A <span style="font-style: italic;" class="mycode_i">Potentially Unsafe Application</span><br />
  - Reason: ESET classifies the use of WinDivert as a potentially unsafe tool because of its low-level network filtering capabilities. This is not a classic “virus” detection, but a strict policy on advanced network tools.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour summary in sandbox (MITRE ATT&amp;CK)</span><br />
When the installer was executed in a sandbox environment, the following categories were observed:<br />
- <span style="font-weight: bold;" class="mycode_b">Execution:</span> scheduled tasks, use of native Windows APIs, loading of shared modules.<br />
- <span style="font-weight: bold;" class="mycode_b">Persistence / Privilege Escalation:</span> creation of startup tasks and services, modification of boot-related registry keys.<br />
- <span style="font-weight: bold;" class="mycode_b">Defense Evasion:</span> use of packing/protection techniques, controlled process injection for monitoring.<br />
- <span style="font-weight: bold;" class="mycode_b">Discovery:</span> collection of system, user and running process information.<br />
<br />
No typical destructive malware behaviours were observed:<br />
- No mass encryption of user files.<br />
- No deletion of system backup copies.<br />
- No exfiltration of documents to external servers.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Lab tests (summary)</span><br />
- Clean install and uninstall on fresh Windows 10/11 virtual machines.<br />
- Verified:<br />
  - Activation of the hardened firewall.<br />
  - Basic operation of the real-time protection module.<br />
  - Logging and reading of security events.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Conclusion:</span><br />
Build 3.0.2.0 CORE behaves as expected for a security product:<br />
- 70 out of 71 external AV engines do not report any malware.<br />
- The only detection comes from ESET’s policy on advanced network tools (WinDivert), not from a real infection.<br />
- Sandbox behaviour analysis shows installation and protection-related activities (services, tasks, monitoring), without ransomware patterns or data theft.<br />
<br />
Users who run ESET alongside GetOverX Shield CORE can add it (and its installation folder) to ESET’s trusted applications / exclusions list if they wish to use both on the same system.<br />
<br />
Link test Virus-Total:<br />
<a href="https://www.virustotal.com/gui/file/9aa57de47ece5c48bec81d689f365e86283edf6c289af15dba8695596bc92050" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/9aa5...596bc92050</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How we test GetOverX Shield]]></title>
			<link>https://forum.getoverx.com/showthread.php?tid=132</link>
			<pubDate>Wed, 10 Dec 2025 00:30:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://forum.getoverx.com/member.php?action=profile&uid=2">mrwebfeeder</a>]]></dc:creator>
			<guid isPermaLink="false">https://forum.getoverx.com/showthread.php?tid=132</guid>
			<description><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">How we test GetOverX Shield before each release</span></span><br />
<br />
In this section you will find real-world test results for GetOverX Shield (CORE, PRO and Enterprise).<br />
<br />
Our goal is to be transparent about how we verify that each build behaves like a security product – not like malware.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Isolated lab (virtual machines)</span><br />
- We use VirtualBox virtual machines with different Windows versions (including Windows Server).<br />
- We test:<br />
  - Installation and uninstallation.<br />
  - Resource usage.<br />
  - Basic operation of firewall, HIPS, antivirus, containment and network modules.<br />
- We verify that there is no unexpected behaviour (data deletion, mass encryption, etc.).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour tests based on MITRE ATT&amp;CK</span><br />
- We run scenarios that simulate common attack techniques (examples: T1059 – PowerShell, T1204 – user execution, T1547 – persistence, T1486 – ransomware-like behaviour).<br />
- We observe how GetOverX Shield responds:<br />
  - Block / contain.<br />
  - EDR alerts.<br />
  - Logs and traces for forensic analysis.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Multi-AV verification (VirusTotal and others)</span><br />
- We upload the final installer to platforms such as VirusTotal so it can be scanned by 70+ independent AV engines.<br />
- We record:<br />
  - Number of engines that detect the build.<br />
  - Detection type (real malware vs. “potentially unsafe application”).<br />
- If there are isolated detections, we evaluate whether they are false positives related to the techniques used by our product (drivers, deep network inspection, etc.).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">4. Publishing the results</span><br />
In this section we will publish:<br />
- Per-version reports (hash, test summary, multi-AV result).<br />
- Notes about relevant false positives (for example, ESET flagging WinDivert as “Potentially Unsafe Application”).<br />
- Technical comments for users who want to review the system’s behaviour in more detail.<br />
<br />
If you have questions about any report or want to suggest new tests, feel free to reply in each thread or open a new topic in this forum.]]></description>
			<content:encoded><![CDATA[<span style="font-weight: bold;" class="mycode_b"><span style="font-size: large;" class="mycode_size">How we test GetOverX Shield before each release</span></span><br />
<br />
In this section you will find real-world test results for GetOverX Shield (CORE, PRO and Enterprise).<br />
<br />
Our goal is to be transparent about how we verify that each build behaves like a security product – not like malware.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">1. Isolated lab (virtual machines)</span><br />
- We use VirtualBox virtual machines with different Windows versions (including Windows Server).<br />
- We test:<br />
  - Installation and uninstallation.<br />
  - Resource usage.<br />
  - Basic operation of firewall, HIPS, antivirus, containment and network modules.<br />
- We verify that there is no unexpected behaviour (data deletion, mass encryption, etc.).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">2. Behaviour tests based on MITRE ATT&amp;CK</span><br />
- We run scenarios that simulate common attack techniques (examples: T1059 – PowerShell, T1204 – user execution, T1547 – persistence, T1486 – ransomware-like behaviour).<br />
- We observe how GetOverX Shield responds:<br />
  - Block / contain.<br />
  - EDR alerts.<br />
  - Logs and traces for forensic analysis.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">3. Multi-AV verification (VirusTotal and others)</span><br />
- We upload the final installer to platforms such as VirusTotal so it can be scanned by 70+ independent AV engines.<br />
- We record:<br />
  - Number of engines that detect the build.<br />
  - Detection type (real malware vs. “potentially unsafe application”).<br />
- If there are isolated detections, we evaluate whether they are false positives related to the techniques used by our product (drivers, deep network inspection, etc.).<br />
<br />
<span style="font-weight: bold;" class="mycode_b">4. Publishing the results</span><br />
In this section we will publish:<br />
- Per-version reports (hash, test summary, multi-AV result).<br />
- Notes about relevant false positives (for example, ESET flagging WinDivert as “Potentially Unsafe Application”).<br />
- Technical comments for users who want to review the system’s behaviour in more detail.<br />
<br />
If you have questions about any report or want to suggest new tests, feel free to reply in each thread or open a new topic in this forum.]]></content:encoded>
		</item>
	</channel>
</rss>