Configure the general settings that apply to scanning of all processes with this user interface console.
For option definitions, click Help in the interface.
- From the Task list, right-click On-Access Scanner, then click Properties to open the dialog box.
- From the On-Access General Policies page, click the General tab to configure the general policy that applies to all on-access scanning. For example, which on-access items to scan, when to scan, the maximum scan time, and if cookies should be scanned.
You can configure scanning of all processes currently running on your system whenever on-access scanning is enabled. This improves your system security, but it can impact your system boot-time performance.To configure the scan processes on enable feature, in the Scan group, click Processes on enable to scan all processes currently running on your system whenever on-access scanning is enabled.Note: Enabling this feature can impact the time it takes for your system to boot up.
- On the ScriptScan tab, enable ScriptScan and configure any scripts to exclude from scanning.
Note: With previous versions of VirusScan Enterprise disabling on-access scanning disabled ScriptScan. With VirusScan Enterprise 8.8 disabling on-access scanning does not disable ScriptScan. To disable ScriptScan deselect the Enable scanning of scripts checkbox.
- On the Blocking tab, configure blocking connections from remote computers that write files with potential threats or unwanted programs.
Note: By default, when a remote system writes any malware to a system with VirusScan Enterprise, VirusScan Enterprise blocks the connection to that remote system.
You can also configure a message that is sent to the system that has written the malware.Note: To send this message requires Windows Messenger service.
- On the Messages tab, configure messages to notify local users when detections occur with a configured message, and specify which actions the user can take against the threat.
- On the Reports tab, enable the scanning activity log files and define where they are stored, their size, format, and any additional scan logging to help you diagnose this threat.
Note: These log files are very helpful when you diagnose security threats and help determine which actions to take against these threats.