{"id":4208,"date":"2022-09-13T12:33:27","date_gmt":"2022-09-13T12:33:27","guid":{"rendered":"https:\/\/www.adlice.com\/?page_id=4208"},"modified":"2026-04-10T07:15:31","modified_gmt":"2026-04-10T07:15:31","slug":"detections","status":"publish","type":"page","link":"https:\/\/www.adlice.com\/fr\/detections\/","title":{"rendered":"D\u00e9tections"},"content":{"rendered":"\n<p>Les sections suivantes s&#8217;appliquent uniquement \u00e0 certains de nos logiciels (<a href=\"https:\/\/www.adlice.com\/fr\/roguekiller\/\">Adlice Protect<\/a> et <a href=\"https:\/\/www.adlice.com\/fr\/diag\/\">Diag<\/a>).<\/p>\n\n\n\n<div style=\"height:41px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">Comment Nous D\u00e9tectons les Malwares<\/p>\n\n\n\n<p>Nos m\u00e9canismes de d\u00e9tection des malwares reposent sur une diversit\u00e9 de technologies et de m\u00e9thodologies, adapt\u00e9es selon que l&#8217;\u00e9l\u00e9ment est analys\u00e9 en m\u00e9moire ou sur disque. Notre approche int\u00e8gre :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Technologies Bas\u00e9es sur des R\u00e8gles<\/strong>&nbsp;: Notre laboratoire de recherche d\u00e9veloppe des r\u00e8gles pr\u00e9cises pour identifier et classifier les malwares.<\/li>\n\n\n\n<li><strong>Moteurs Heuristiques<\/strong>&nbsp;: Ces moteurs analysent les artefacts et m\u00e9tadonn\u00e9es des fichiers pour d\u00e9terminer s&#8217;ils sont malveillants.<\/li>\n\n\n\n<li><strong>Signatures Cloud<\/strong>&nbsp;: Nous utilisons des signatures bas\u00e9es sur le cloud pour reconna\u00eetre les menaces de malwares connues.<\/li>\n\n\n\n<li><strong>MalPE-AI<\/strong>&nbsp;: Notre moteur de d\u00e9tection le plus avanc\u00e9, MalPE-AI, utilise l&#8217;intelligence artificielle pour am\u00e9liorer significativement la pr\u00e9cision de la d\u00e9tection tout en minimisant les faux positifs.<\/li>\n<\/ul>\n\n\n\n<p>Bien que nous visions une d\u00e9tection exhaustive, il est important de noter qu&#8217;aucun syst\u00e8me ne peut garantir une d\u00e9tection \u00e0 100% des malwares. Cependant, le d\u00e9ploiement de MalPE-AI a consid\u00e9rablement am\u00e9lior\u00e9 nos capacit\u00e9s dans ce domaine.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">Identification des Programmes Potentiellement Ind\u00e9sirables (PUPs)<\/p>\n\n\n\n<p>Les Programmes Potentiellement Ind\u00e9sirables (PUPs) sont g\u00e9n\u00e9ralement consid\u00e9r\u00e9s comme s\u00fbrs, car ils n&#8217;ex\u00e9cutent pas d&#8217;actions malveillantes et n&#8217;ont pas l&#8217;intention de nuire \u00e0 l&#8217;utilisateur ou \u00e0 ses donn\u00e9es. Dans notre logiciel, les d\u00e9tections \u00e9tiquet\u00e9es &#8220;PUP.SomeProgramName&#8221; indiquent qu&#8217;un programme a \u00e9t\u00e9 identifi\u00e9 comme un PUP.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Pourquoi Nous D\u00e9tectons les PUPs<\/h4>\n\n\n\n<p>Les PUPs sont d\u00e9tect\u00e9s car ils peuvent \u00eatre intrusifs et avoir un impact n\u00e9gatif sur les performances du syst\u00e8me. Souvent, ces programmes sont <a href=\"https:\/\/www.adlice.com\/fr\/supprimer-pup\/\">install\u00e9s via des affiliations<\/a> ou des partenariats avec d&#8217;autres logiciels.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Crit\u00e8res de D\u00e9tection des PUPs<\/h4>\n\n\n\n<p>Nos crit\u00e8res pour identifier les PUPs incluent, sans s&#8217;y limiter :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tactiques de marketing agressives avec des descriptions trompeuses (par exemple, les nettoyeurs de registre).<\/li>\n\n\n\n<li>Regroupement avec d&#8217;autres installations de logiciels (propos\u00e9s comme une &#8220;offre optionnelle&#8221;).<\/li>\n\n\n\n<li>Modifications profondes du syst\u00e8me affectant les performances (par exemple, les barres d&#8217;outils du navigateur).<\/li>\n\n\n\n<li>Difficult\u00e9 de d\u00e9sinstallation ou de suppression par l&#8217;utilisateur.<\/li>\n\n\n\n<li>Comportements d\u00e9gradant l&#8217;exp\u00e9rience utilisateur (par exemple, affichage de publicit\u00e9s, minage de cryptomonnaies).<\/li>\n<\/ul>\n\n\n\n<p>Si vous pensez qu&#8217;un programme a \u00e9t\u00e9 incorrectement identifi\u00e9 comme un PUP, veuillez <a href=\"https:\/\/www.adlice.com\/fr\/contact\/\">contacter notre \u00e9quipe de support<\/a> pour obtenir de l&#8217;aide.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les sections suivantes s&#8217;appliquent uniquement \u00e0 certains de nos logiciels (Adlice Protect et Diag). Comment Nous D\u00e9tectons les Malwares Nos m\u00e9canismes de d\u00e9tection des malwares reposent sur une diversit\u00e9 de technologies et de m\u00e9thodologies, adapt\u00e9es selon que l&#8217;\u00e9l\u00e9ment est analys\u00e9 en m\u00e9moire ou sur disque. Notre approche int\u00e8gre : Bien que nous visions une d\u00e9tection&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4208","page","type-page","status-publish","hentry","description-off"],"views":0,"featured_image_src":null,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/fr\/detections\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/fr\/detections\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T07:15:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"276\" \/>\n\t<meta property=\"og:image:height\" content=\"276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/fr\/detections\/\",\"url\":\"https:\/\/www.adlice.com\/fr\/detections\/\",\"name\":\"D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\"},\"datePublished\":\"2022-09-13T12:33:27+00:00\",\"dateModified\":\"2026-04-10T07:15:31+00:00\",\"description\":\"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/detections\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/fr\/detections\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/fr\/detections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9tections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#website\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software","description":"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/fr\/detections\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software","og_description":"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.","og_url":"https:\/\/www.adlice.com\/fr\/detections\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_modified_time":"2026-04-10T07:15:31+00:00","og_image":[{"width":276,"height":276,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@AdliceSoftware","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/fr\/detections\/","url":"https:\/\/www.adlice.com\/fr\/detections\/","name":"D\u00e9tections | Pourquoi y a t-il une d\u00e9tection ? \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/fr\/#website"},"datePublished":"2022-09-13T12:33:27+00:00","dateModified":"2026-04-10T07:15:31+00:00","description":"La d\u00e9tection de logiciels malveillants dans nos produits reposent sur de nombreuses technologies et approches diff\u00e9rentes. En savoir plus.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/fr\/detections\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/fr\/detections\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/fr\/detections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/fr\/"},{"@type":"ListItem","position":2,"name":"D\u00e9tections"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/fr\/#website","url":"https:\/\/www.adlice.com\/fr\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/fr\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/pages\/4208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/comments?post=4208"}],"version-history":[{"count":2,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/pages\/4208\/revisions"}],"predecessor-version":[{"id":277483,"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/pages\/4208\/revisions\/277483"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/fr\/wp-json\/wp\/v2\/media?parent=4208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}