- On-Access Default Processes — Choose to configure one scanning policy for all processes or configure different scanning policies for default processes, low-risk processes, and high-risk processes.
Note: If you choose to configure one scanning policy, this policy applies to all processes. If you choose to configure different scanning policies for low-risk and high risk policies, this policy applies only to the processes that are not defined as low-risk or high-risk.
- On-Access Low-Risk Processes — Specify the processes that you define as low-risk.
- On-Access High-Risk Processes — Specify the processes that you define as high-risk.
Note: The Configure different scanning policies for high-risk, low-risk, and default processes option must be selected on the On-Access Default Processes tab before you can configure individual policies for low-risk and high-risk processes.
|Scan Items ||
- Configure whether to scan files on read, on write, on network drives and opened for backup.
Failure to enable When writing to disk and When reading from disk leaves your system unprotected from numerous malware attacks.
- Configure which files and file types to scan.
Failure to enable All files leaves your system unprotected from numerous malware attacks.
- Scan for potential threats that resemble unwanted programs, Trojan horses and macro viruses.
- Scan inside archives and decode MIME encoded files.
- Enable on-access scanning for unwanted programs.
|Exclusions ||Configure which disks, files, and folders to exclude from scanning.
For threat detections:
- Primary action to take when a threat is detected.
- Secondary action to take on a threat detection if the first action fails.
For unwanted program detections:
- Primary action to take when an unwanted program is detected.
- Secondary action to take on an unwanted program detection if the first action fails.