A detectoid is an application written to detect data and state changes related to a particular security solution or solutions provided by a particular vendor.
In general, a detectoid may be configured to monitor any security-related information stored on a computer and any security-related processes running on the computer.
For example, a detectoid may examine registry entries, a service control manager, file system objects, and other data andprocesses to determine the status of the security solution or solutions it monitors.
The set of detectoids may be fixed at compile time to avoid security vulnerabilities including the potential of adding additional detectoids (by a malicious program,for example) at run time.
The set of detectoids present in the security center may be changed by providing a new version of the service 1205.