ePolicy Orchestrator 4.0

Configure the general settings that apply to scanning of all processes with this user interface console.

Task

For option definitions, click ? in the interface.

  1. Click Systems | Policy Catalog, then from the Product list select VirusScan Enterprise 8.8.0. The Category list displays the policy categories for VirusScan Enterprise 8.8.0.
  2. Edit an existing policy or create a new policy: Edit an existing policy
    1. From the Category list, select the policy category.
    2. From the Actions column, click Edit to open the policy configuration page.

    Create a new policy

    1. Click New Policy to open New Policy dialog box.
    2. From the Create a new policy based on this existing policy list, select one of the settings.
    3. Type a new policy name.
    4. Click OK. The new policy appears in the list of existing policies.
  3. From the Settings for list, select Workstation or Server.
  4. From the On-Access General Policies page, click the General tab to configure the general policy that applies to all on-access scanning. For example, which on-access items to scan, when to scan, the maximum scan time, and if cookies should be scanned.

    You can configure scanning of all processes currently running on your system whenever on-access scanning is enabled. This improves your system security, but it can impact your system boot-time performance.

    To configure the scan processes on enable feature, in the Scan group, click Processes on enable to scan all processes currently running on your system whenever on-access scanning is enabled.
    Note: Enabling this feature can impact the time it takes for your system to boot up.
  5. On the ScriptScan tab, enable ScriptScan and configure any processes or URLs to exclude from scanning.
    Note: With previous versions of VirusScan Enterprise disabling on-access scanning disabled ScriptScan. With VirusScan Enterprise 8.8 disabling on-access scanning does not disable ScriptScan. To disable ScriptScan deselect the Enable scanning of scripts checkbox.
  6. On the Blocking tab, configure blocking connections from remote computers that write files with potential threats or unwanted programs.
    Note: By default, when a remote system writes any malware to a system with VirusScan Enterprise, VirusScan Enterprise blocks the connection to that remote system.

    You can also configure a message that is sent to the system that has written the malware.

    Note: To send this message requires Windows Messenger service.
  7. On the Messages tab, configure messages to notify local users when detections occur with a configured message, and specify which actions the user can take against the threat.
  8. On the Reports tab, enable the scanning activity log files and define where they are stored, their size, format, and any additional scan logging to help you diagnose this threat.
    Note: These log files are very helpful when you diagnose security threats and help determine which actions to take against these threats.

ePolicy Orchestrator 4.0