Avast WEBforum

Consumer Products => Avast Mac Security => Topic started by: ddabrahim on August 20, 2020, 12:19:43 PM

Title: How the wifi inspector decide if the network and devices are secure or not?
Post by: ddabrahim on August 20, 2020, 12:19:43 PM
Hi.

When I scan my network Avast analyse the devices on my network and report each device is "secured" and also that my network is secure.
I was wondering how Avast actually decide if the network and the devices are secure.

So if a hacker start scanning my devices for open ports and try to connect, would avast actually notice that if a device behave suspicious on the network or in case a device have open ports? Or what does it actually mean a device is "secured" how exactly Avast "secured" the device?

I mean "secure, secured, safe" is nice words and the green colour is calming but I would like to actually know and understand how it is actually works.
Could anyone please explain? I would appreciate any help.

Thanks.
Title: Re: How the wifi inspector decide if the network and devices are secure or not?
Post by: Radek Brich on September 07, 2020, 09:25:31 AM
Hi, "This device is secured" means that Avast did not found any known vulnerabilities. The network scanner is actively testing the devices with a set of detections, for example: weak password, authentication bypass and other exploitable spots in admin interfaces. There are currently around a hundred of these detections, where most of them are specific to some router model or vendor. Some generic issues are listed here: https://help.avast.com/en/av_mac_free/14/hns/hns-vulnerable.html#issue_list

Quote
So if a hacker start scanning my devices for open ports and try to connect, would avast actually notice that if a device behave suspicious on the network or in case a device have open ports?

No, Avast won't notice suspicious behavior on the network, it can't do that from the position of normal device. It works more like a prevention - the scan searches for vulnerabilities of other devices in the network and reports them, so you know about the weak spots before an attacker can exploit them.