Tab
| Definitions
|
Processes |
- On-Access Default Processes — Choose to configure one scanning policy for all processes or configure different scanning policies for default processes, low-risk processes, and high-risk processes.
Note: If you choose to configure one scanning policy, this policy applies to all processes. If you choose to configure different scanning policies for low-risk and high risk policies, this policy applies only to the processes that are not defined as low-risk or high-risk.
- On-Access Low-Risk Processes — Specify the processes that you define as low-risk.
- On-Access High-Risk Processes — Specify the processes that you define as high-risk.
Note: The Configure different scanning policies for high-risk, low-risk, and default processes option must be selected on the On-Access Default Processes tab before you can configure individual policies for low-risk and high-risk processes.
|
Scan Items |
- Configure whether to scan files on read, on write, on network drives and opened for backup.
CAUTION:
Failure to enable When writing to disk and When reading from disk leaves your system unprotected from numerous malware attacks.
- Configure which files and file types to scan.
CAUTION:
Failure to enable All files leaves your system unprotected from numerous malware attacks.
- Scan for potential threats that resemble unwanted programs, Trojan horses and macro viruses.
- Scan inside archives and decode MIME encoded files.
- Enable on-access scanning for unwanted programs.
|
Exclusions | Configure which disks, files, and folders to exclude from scanning.
|
Actions |
For threat detections:
- Primary action to take when a threat is detected.
- Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
- Primary action to take when an unwanted program is detected.
- Secondary action to take on an unwanted program detection if the first action fails.
|
|