to the system that Microsoft considers important ...The tool analyzes changed or newly added files, registry keys, services, ActiveX Controls, listening ports, access control lists and other parameters.Analyzer does not appear to rely on signatures or try to exploit known vulnerabilities.